Previous Article in Journal
Toward Generative AI-Based Intrusion Detection Systems for the Internet of Vehicles (IoV)
Previous Article in Special Issue
Exponential Backoff and Its Security Implications for Safety-Critical OT Protocols over TCP/IP Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware

by
Mazen Gazzan
1,
Bader Alobaywi
2,3,
Mohammed Almutairi
2,3,* and
Frederick T. Sheldon
2,*
1
Department of Information Systems, College of Computer Science and Information Systems, Najran University, Najran 61441, Saudi Arabia
2
Department of Computer Science, College of Engineering, University of Idaho, Moscow, ID 83844, USA
3
College of Computer Science and Engineering, University of Hafr Al Batin, Hafar Al Batin 39923, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Future Internet 2025, 17(7), 311; https://doi.org/10.3390/fi17070311 (registering DOI)
Submission received: 16 March 2025 / Revised: 1 July 2025 / Accepted: 11 July 2025 / Published: 18 July 2025

Abstract

Ransomware, a significant cybersecurity threat, encrypts files and causes substantial damage, making early detection crucial yet challenging. This paper introduces a novel multi-phase framework for early ransomware detection, designed to enhance accuracy and minimize false positives. The framework addresses the limitations of existing methods by integrating operational data with situational and threat intelligence, enabling it to dynamically adapt to the evolving ransomware landscape. Key innovations include (1) data augmentation using a Bi-Gradual Minimax Generative Adversarial Network (BGM-GAN) to generate synthetic ransomware attack patterns, addressing data insufficiency; (2) Incremental Mutual Information Selection (IMIS) for dynamically selecting relevant features, adapting to evolving ransomware behaviors and reducing computational overhead; and (3) a Deep Belief Network (DBN) detection architecture, trained on the augmented data and optimized with Uncertainty-Aware Dynamic Early Stopping (UA-DES) to prevent overfitting. The model demonstrates a 4% improvement in detection accuracy (from 90% to 94%) through synthetic data generation and reduces false positives from 15.4% to 14%. The IMIS technique further increases accuracy to 96% while reducing false positives. The UA-DES optimization boosts accuracy to 98.6% and lowers false positives to 10%. Overall, this framework effectively addresses the challenges posed by evolving ransomware, significantly enhancing detection accuracy and reliability.

1. Introduction

While technological innovation has yielded substantial advancements, it has contemporaneously amplified security vulnerabilities, particularly concerning malicious software (malware) such as viruses, worms, Trojans, rootkits, and ransomware [1,2,3]. Ransomware, emerging as a significant threat since the 1980s, is engineered to impede access to critical data and disrupt operational continuity [4,5]. Distinct from other malware, ransomware employs data encryption or locking mechanisms to extort victims, impacting both individual users and enterprise operations [6,7]. Its capacity to compromise operational data and system resources renders it particularly pernicious. The proliferation of accessible development toolkits has facilitated the exploitation of unpatched systems and software vulnerabilities by malicious actors [8,9]. The WannaCry attack, leveraging the Eternal Blue vulnerability, serves as a stark illustration, compromising 230,000 systems across 150 nations and incurring losses exceeding USD 8 billion [2]. Ransomware’s reach into Industrial IoT and Supervisory Control and Data Acquisition (SCADA) systems now most certainly threatens critical infrastructure [10]. This expansion unveils profound vulnerabilities and systemic risks, foreshadowing societal catastrophes without robust mitigation strategies and methodologies.
Notable ransomware attacks on Industrial Control Systems (ICSs) critical infrastructure, such as the Colonial Pipeline attack in 2021, show the extensive disruption these attacks can cause to essential services and the economy [11]. These incidents highlight the need for stronger cybersecurity measures, particularly for Operational Technology (OT) systems, which manage critical infrastructure. The National Institute of Standards and Technology (NIST) has developed guidelines to improve OT security to emphasize the importance of performance, reliability, and safety in defending against any threats [11].

1.1. Problem and Motivation

The escalating threat of ransomware demands new, effective detection strategies to catch attacks early. While current approaches fall into three main categories—process-centric, data-centric, and resource-centric—they all struggle against modern ransomware’s sophisticated evasion tactics [8,9,12].
  • Process-centric methods analyze running programs, but they often need complete data to work, which makes early detection difficult.
  • Data-centric approaches monitor user files for unusual changes. However, they frequently produce too many false alarms because they cannot easily tell the difference between normal file changes and malicious ransomware activity. This leads to slow responses.
  • Ransomware’s polymorphic nature (meaning it can constantly change its appearance) and its ability to mimic legitimate software further complicate early detection. The critical pre-encryption phase is especially challenging; it is so brief and elusive that traditional analysis struggles to collect enough data for timely and accurate detection [13,14].
Some researchers have tried to identify features of “immature” pre-encryption ransomware, but these features quickly become outdated due to ransomware’s rapid evolution [13,15]. This is where advanced techniques come in. Generative Adversarial Networks (GANs) show promise for generating realistic, synthetic attack patterns, which could help overcome the problem of not having enough real-world data. However, standard GANs have their own issues:
  • Their Minimax loss function struggles to accurately model the complex differences between real and synthetic ransomware data, particularly during that critical pre-encryption phase.
  • GANs are also vulnerable to the “curse of dimensionality,” meaning they need effective ways to select important features. Traditional feature selection methods often are not adaptable enough to keep up with evolving ransomware [16].
Furthermore, building and training robust detection models, like Deep Belief Networks (DBNs), is complicated by the risk of overfitting—where the model performs well on training data but poorly on new, unseen data. Existing methods for deciding when to stop training (epochs) do not fully account for the unpredictable nature of ransomware [17,18,19,20].
Our research addresses these challenges head-on. We have developed an innovative framework that enhances GAN-based early ransomware detection. This framework incorporates novel mechanisms to adapt to changing feature significance and dynamically adjust training, significantly improving detection accuracy and preventing overfitting through a new three-phase approach [21,22]. Our goal is to provide a more robust, adaptable, and effective solution to combat the ever-growing threat of ransomware.

1.2. Research Questions and Objectives

This work introduces an enhanced framework for early ransomware detection. Our approach addresses critical challenges in current detection methods by (i) generating synthetic data to overcome scarcity in the ransomware’s pre-encryption phase, (ii) employing incremental learning for dynamic updates to feature relevance, and (iii) utilizing a Bayesian approach to estimate uncertainty for optimized training adjustments.

1.2.1. Research Questions

To achieve the overarching goal of improved ransomware detection, this research investigates the following key questions:
  • To what extent does GAN-based data augmentation mitigate pre-encryption data scarcity and enhance ransomware early detection?
  • How can mutual information feature selection techniques be integrated into a DBN-based ransomware detection model to enable dynamic feature relevance reassessment with the incorporation of new data?
  • How can an uncertainty-based estimation approach be utilized to determine the optimal number of training epochs for a DBN-based ransomware detection model?

1.2.2. Objectives

This research aims to significantly enhance early ransomware detection by addressing key limitations in existing approaches. Our specific objectives are as follows:
  • Introduce an enhanced GAN-based data augmentation module with a novel Bi-Gradual Minimax loss function. Existing GAN models struggle to accurately bridge the gap between real and synthetic data distributions, especially with scarce pre-encryption data. Our new loss function, employing a gradual up-weighting coefficient, minimizes this divergence, enabling the generation of highly realistic artificial ransomware attack patterns. This directly tackles data scarcity, a major obstacle to early detection, and is expected to significantly improve accuracy.
  • Propose an Incremental Mutual Information Selection (IMIS) technique to enhance model adaptability. Traditional feature selection methods often become outdated due to the dynamic nature of ransomware. IMIS dynamically reassesses feature relevance as new data integrates into our custom DBN-based model. This on-the-fly adaptation allows continuous learning and improved detection accuracy against evolving threats, ensuring long-term effectiveness.
  • Present an Uncertainty-Aware Dynamic Early Stopping (UA-DES) criterion and method to optimize DBN training. Overfitting is a common challenge in DBN training, particularly in determining optimal epochs. Existing dynamic approaches often fall short due to the inherent variability of ransomware behavior. By leveraging Bayesian approximation to accurately estimate uncertainty, UA-DES aims to determine the optimal number of training epochs, leading to improved model generalization, best-in-class prediction performance, and effective overfitting prevention.

1.3. Early Detection Value Proposition

This paper introduces the Polymorphic Ransomware Deep Learning (PRDL) framework, a novel and sophisticated solution designed to significantly improve the early detection of evasive, shapeshifting ransomware during its brief pre-encryption phase, a critical window before any data is locked or ransom demands are made. Traditional cybersecurity methods often fail in this phase due to limited observable behavior, constant code mutations, and a lack of model adaptability. To overcome these challenges, the PRDL framework integrates a GAN-augmented DBN and introduces three key innovations:
  • Realistic Ransomware Pattern Generation: A novel Bi-Gradual Minimax Loss function uses a gradual up-weighting coefficient to enable the GAN to produce highly realistic artificial ransomware attack patterns.
  • Dynamic Feature Adaptation: An Incremental Mutual Feature Selection (IMIS) technique allows the model to continuously adapt to evolving ransomware behaviors by reassessing feature relevance.
  • Optimized Training for Timely Detection: The Uncertainty-Aware Dynamic Early Stopping (UA-DES) technique, based on Bayesian approximation, precisely determines the optimal training epochs for the DBN, ensuring efficient and early detection.
Beyond technical enhancements, the PRDL framework contributes strategically to ransomware defense by providing
  • First-of-its-Kind Taxonomy of Ransomware Attack Success Factors: This work introduces a groundbreaking categorization of factors contributing to successful ransomware attacks, particularly within industrial SCADA environments. This offers essential insights for risk mitigation and targeted defense [11,14].
  • Comprehensive Ransomware Attack Model for Industrial Systems: We have developed a detailed model illustrating ransomware’s operational mechanisms in industrial systems, crucial for designing effective prevention and mitigation strategies.
  • Advanced Situational Awareness for Prediction: The framework enhances the ability to predict ransomware attacks by integrating diverse evidence, enabling proactive intervention. It also establishes a benchmark for evaluating future ransomware prediction methodologies in Industrial Control Systems (ICSs) [10].

1.4. Overview of the 3-Phase Framework

The proposed framework, named a “custom GAN-augmented Deep Belief Network (DBN) model,” tackles these challenges through a three-phase approach:
Phase 1: Generating Realistic Ransomware Data (GAN Pre-encryption Data Augmentation)
  • What it does: Uses a GAN to create synthetic, yet realistic, ransomware attack patterns.
  • Why it is important: Real-world pre-encryption ransomware data is scarce. GANs help overcome this data insufficiency, allowing the detection model to be trained on a much larger and more diverse set of potential attack scenarios. The framework employs a “Bi-Gradual Minimax loss function” to make the synthetic data even more accurate.
Phase 2: Smartly Selecting Key Indicators IMIS
  • What it does: Employs an IMIS technique to identify and prioritize the most important “features” or indicators of ransomware behavior.
  • Why it is important: Ransomware constantly evolves, meaning what was a useful indicator yesterday might not be today. IMIS dynamically reassesses which features are most relevant as new data becomes available, ensuring the detection model focuses on the most current and effective signals, while also avoiding redundant information.
Phase 3: Optimizing the Detection Model (Deep Belief Network with Uncertainty-Aware Dynamic Early Stopping)
  • What it does: Trains a DBN using the augmented data and selected features. It introduces a UA-DES criterion.
  • Why it is important: Training deep learning models can lead to “overfitting,” where the model becomes too good at recognizing the training data but performs poorly on new, unseen data. UA-DES helps determine the optimal point to stop training, preventing overfitting and improving the model’s ability to accurately detect new and evolving ransomware threats. It does this by considering the uncertainty in the model’s predictions.
Essentially, our deep learning framework creates its own “training data” for rare ransomware behaviors, intelligently picks out the most relevant clues, and then trains a powerful detection system in a way that makes it highly adaptable and accurate against the ever-changing threat of polymorphic ransomware, especially in critical infrastructure like SCADA systems.

1.5. Example Use Case

Imagine a security team at a water treatment plant that uses SCADA systems to control its operations. They are constantly concerned about ransomware attacks, especially new, “polymorphic” variants that traditional antivirus often misses. Here is how this framework could be “used”:
Data Augmentation (Phase 1)
  • Scenario: The security team has logs from a few past ransomware incidents, but these are limited, especially for the very early, pre-encryption stages.
  • Framework in Action: The GAN component of the framework would take these limited real-world ransomware logs and generate thousands of synthetic but highly realistic “pre-encryption” ransomware behaviors. These synthetic logs would include subtle system changes, file access patterns, or network communication anomalies that might occur just before encryption. This massively expands the training data available to the security team’s detection system.
Feature Selection (Phase 2)
  • Scenario: As new, real-world (or even synthetic) data comes in from various sources—perhaps from threat intelligence feeds about emerging ransomware or from internal simulations—the security team needs to know which indicators are still relevant. For example, a previous ransomware might have always accessed a specific registry key, but a new variant might not.
  • Framework in Action: The IMIS component would continuously analyze all the available data (real and synthetic). It would dynamically identify which specific actions, API calls, or network patterns are currently the strongest indicators of ransomware behavior, and which ones are becoming less relevant for detection. For instance, it might determine that unusual file system enumeration combined with specific network beaconing is a very strong indicator for a new variant, while a previously important indicator (like a specific DLL injection) is now less reliable. The system automatically prioritizes these most relevant “features” for the detection model.
Model Training and Detection (Phase 3)
  • Scenario: The security team wants their SCADA system’s security software to detect ransomware as early as possible, without generating too many false alarms (e.g., stopping a legitimate system update). They also need the model to be robust and adaptable.
  • Framework in Action: The DBN, trained on the GAN-augmented data and using the IMIS-selected features, would constantly monitor the water treatment plant’s SCADA systems. The UA-DES part of the framework ensures the DBN is trained just enough to be highly accurate but not so much that it overfits (leading to false positives). If the DBN detects a sequence of behaviors (based on the dynamically selected features) that strongly resembles ransomware, it would trigger an alert. For example, it might flag a sudden, unusual attempt to access specific operational data files followed by an attempt to modify system services, even if the exact pattern has not been seen before but falls within the learned “ransomware behavior space.” This early alert allows the security team to intervene before any critical systems are encrypted or damaged.

1.6. Multi-Step Deep Learning Approach

There is a Glossary of Acronyms just before the References, and an Appendix with a small set of ransomware case reviews, data samples, and code snippets. Section 1 introduces the problem of early ransomware detection, outlining research questions, objectives, and contributions. Section 2 analyzes current early ransomware detection models, examining state-of-the-art techniques and key research gaps. Section 3 details the proposed framework, research methodology, and experimental architecture, including dataset characteristics and evaluation metrics. Section 4 presents the design and development of the proposed ransomware detection framework, including (i) GAN-based data augmentation, (ii) IMIS-driven dynamic feature selection, and (iii) DBN-based detection model training (UA-DES). Detailed analyses, encompassing process descriptions and the experimental results, are provided for each phase. Section 5 synthesizes the research findings, highlights key contributions and implications, and proposes future research directions.

2. Related Work

The operational benefits of SCADA system deployment are undeniable; however, this proliferation has created substantial cybersecurity challenges [23]. SCADA systems are inherently complex, comprising diverse components and protocols that frequently exhibit interoperability issues and operate under disparate standards [24]. Moreover, their growing connectivity to public networks, intended to facilitate interoperability, dramatically increases their vulnerability to cyber threats. These threats include malicious software specifically crafted to steal sensitive information, gain unauthorized access, and disrupt vital industrial processes, as shown in Figure 1 [23,25].
Malicious software has evolved significantly since its first appearance in the late 1970s [26]. Advanced strains, such as viruses, worms, Trojans, and ransomware, now pose significant threats [25,27,28]. Ransomware stands out as a particularly insidious threat, leveraging encryption to render data inaccessible and exploiting victims’ fear of critical resource or sensitive information loss to extort ransom payments [29,30,31,32,33,34]. Ransomware attacks are often irreversible because they use encryption, and their financial profitability motivates adversaries to develop increasingly advanced versions [13,35]. Moreover, the financial impact of ransomware attacks is substantial, with ransom demands ranging from USD 300–USD 700 for individuals and USD 10,000–USD 17,000 for enterprises [36]. In some cases, victims have paid as much as USD 400,000 in a single month [37], and the FBI’s Internet Crime Complaint Center reported losses of approximately USD 18 million from ransomware attacks between April 2014 and June 2015 [38,39].
Probably the most famous attack, although not targeted at ICSs, in recent memory (Feb. 2024) was the (Russian speaking) hacker gang known as BlackCat (also as ALPHV), receiving a payment of USD 22 million via Bitcoin. Though the victims made the ransomware payment, UnitedHealth Group CEO Andrew Witty shared on 1 May 2024 to Congress that Change Healthcare did not obtain its data back. Total damages are estimated to be almost USD 3B (BlackCat operates as a Ransomware-as-a-Service (RaaS) platform, allowing other cybercriminals to use its ransomware in exchange for a share of the profits. While most RaaS models let affiliates retain about 70% of their earnings, BlackCat offers a more generous share, allowing affiliates to keep 80–90% of their profits (see “Breaking Down the BlackCat Ransomware Operation,” CIS, 7 July 2022. Available: https://www.cisecurity.org/insights/blog/breaking-down-the-blackcat-ransomware-operation (accessed on 1 March 2025), and a USD 10M + USD 5M = USD 15M reward is being offered). Though this was not an attack on ICSs, the attack is estimated to have resulted in a total impact of USD 2.87 billion, including USD 1.7 billion in direct response costs. Change Healthcare covers about 50% of medical claims in the US for around 900,000 physicians, 33,000 pharmacies, 5500 hospitals, and 600 laboratories. This incident underscores the catastrophic potential of single-point-of-failure systems, a stark warning as our world increasingly relies on operational monopolies. Refer to Appendix A for more detailed discussion of the methods and tactics for this and the other attacks mentioned in this article).
Given the escalating threat of ransomware, understanding the factors driving attack success is crucial. This research leverages the developed framework to analyze these factors, specifically within SCADA system attack models. By elucidating the tools and mechanisms employed during attacks, the model facilitates the development of effective security measures tailored to safeguard SCADA environments [40,41,42].

2.1. Ransomware Attacks and Trends

On 21 February 2024, Change Healthcare, a key healthcare technology unit of UnitedHealthcare Group, was severely disrupted by a ransomware attack attributed to the ALPHV (also known as BlackCat) ransomware group. This breach, as reported by The Washington Post and later confirmed by UnitedHealth Group, exposed the data of an estimated 190 million Americans and crippled critical operations across the U.S. healthcare system. The immediate consequences were widespread; pharmacies experienced significant disruptions in processing insurance claims and paying providers, often forcing them to resort to manual workarounds and cash transactions. This incident serves as a stark reminder of the acute vulnerability of essential healthcare infrastructure to the devastating effects of ransomware attacks, highlighting the critical need for robust cybersecurity measures within the sector. Consequently, pharmacies experienced widespread disruptions in processing insurance claims and paying providers, forcing them to rely on manual workarounds and cash transactions. This incident serves as a stark reminder of the acute vulnerability of essential healthcare infrastructure to the devastating effects of ransomware.
Beyond healthcare, Phobos ransomware has remained a persistent threat since May 2019, utilizing a Ransomware-as-a-Service model to target government, education, and other critical infrastructures. These groups employ techniques such as network intrusion, data exfiltration, and encryption, prompting U.S. government agencies to issue urgent mitigation guidelines.
The year 2021 witnessed two devastating ransomware attacks that laid bare the vulnerabilities of U.S. critical cyber-physical infrastructure. In May, the Colonial Pipeline attack crippled fuel supplies across the East Coast, sparking widespread panic buying, severe shortages, and soaring prices. This disruption forced the company to capitulate, paying a USD 4.4 million ransom. Just weeks later, JBS, a global meat processing giant, suffered a similar fate, halting operations in the U.S., Canada, and Australia and ultimately succumbing to a USD 11 million ransom demand. Both attacks were executed using sophisticated ransomware variants, notably Ryuk, highlighting the escalating threat to vital sectors.
These incidents highlight the growing sophistication and persistence of ransomware campaigns and their capacity to inflict widespread economic and social disruptions. They also emphasize the urgent need for organizations managing critical infrastructure to implement robust cybersecurity measures and ensure regular system updates and patching to mitigate these escalating risks.

2.2. Ransomware Success Factors

Ransomware attacks have become increasingly effective due to several contributing factors, which can be broadly categorized into operational-related and resource-related factors.

2.2.1. Operational-Related Factors

Ransomware attacks are often successful due to a combination of factors: end-user vulnerabilities, insufficient backup policies, and the use of anonymous payment methods. End-users often underestimate their vulnerability, believing that only critical organizational resources are targeted. This misconception allows attackers to exploit unprotected endpoints through phishing, malicious links, and social engineering [43,44]. Luo and Liao [45] highlight the importance of user education across organizations to mitigate these risks. Secondly, ineffective backup policies hinder data recovery and business continuity during attacks. Organizations may neglect user-level data backups, leaving sensitive information exposed, and individuals often rely on default backup settings, further exacerbating the problem [23,46,47,48]. Finally, the use of cryptocurrencies like Bitcoin provides attackers with safe and anonymous payment methods, enabling them to demand and receive ransoms without revealing their identities. This anonymity has fueled the growth of ransomware operations, including Ransomware-as-a-Service models [49].

2.2.2. Resource-Related Factors

Ransomware attacks exploit several resource-related vulnerabilities: data vulnerabilities, susceptibility to service disruptions, and a lack of specialized expertise.
  • Data Vulnerabilities: IoT and SCADA devices collect and transmit critical data used in control systems. Ransomware attacks targeting these data storages can encrypt or hijack (inject false data) operational data, which damages systems. Data servers, Human–Machine interfaces, and connected networks within SCADA systems are particularly sensitive due to their exposure to external networks [50,51].
  • Service Disruption: Resource-limited devices often cannot easily recover from service disruptions caused by ransomware. Locking up ransomware, which disables device services without encryption, is a common tactic against such systems. Also, attackers can easily disable critical services required for operational decision-making [52].
  • Lack of Expertise: Industrial systems like SCADA devices often run on specific operating systems that have not undergone enough research by the cybersecurity community. This lack of focus creates vulnerabilities that attackers exploit through zero-day attacks. The low interest in securing SCADA systems among researchers and industry professionals makes the issue bigger, and that can make them attractive targets [53].

2.3. Current Detection and Prevention Methods

Ransomware defenses are categorized into prevention, detection, and prediction. Prevention uses predefined rules and procedures to block attacks in real-time, but is static and vulnerable to human error due to reliance on manual configurations [54]. Detection models identify threats with similar behaviors by relying on known attack patterns, forming a proactive defense. Prediction enhances these approaches by anticipating future attacks. However, traditional prediction models fail to account for ransomware’s dynamic nature and obfuscation techniques like polymorphism and metamorphism [26,27].

2.3.1. Ransomware Prevention

Prevention research emphasizes factors that enhance preventive measures, including organizational size, security posture, and ransomware sophistication [55]. Studies also assess how business continuity disruptions, recovery timeframes, and the number of affected devices impact prevention effectiveness. Also, studies assess how business continuity disruptions, recovery timeframes, and the number of affected devices influence prevention effectiveness. Other contributors to ransomware’s success, such as anonymous payment systems and easily accessible development tools, are frequently studied in isolation, which limits their practical applicability [56]. As discussed in Section 2.2.2, SCADA systems pose additional challenges due to their unique architectures and resource constraints. Additionally, user behavior significantly influences malware spread. Factors like internet usage, peer-to-peer applications, and technical expertise play a role [57]. Research using routine activity theory indicates that legitimate software use has a weak correlation with malware infections, while illegitimate software use significantly increases risk [29].

2.3.2. Gaps in Ransomware Prediction and Detection

Truly effective ransomware prediction demands a synergistic blend of operational and situational data. Operational data, gleaned from ransomware processes, must be contextualized by situational intelligence, encompassing the system’s security posture and real-time state. This fusion enables models to adapt to the evolving and dynamic nature of ransomware. Alarmingly, a significant portion of current models remain tethered to historical data alone, rendering them woefully inadequate against sophisticated, contextually aware attacks.
Advanced approaches include machine learning and deep learning models. For example, GANs generate new malware samples to train detection engines on unseen variants [30]. Models like MalDeepNet and MalGAN predict malware behavior trends and create adversarial samples to enhance black-box detection systems [31,32]. Supervised learning models [33] and regression-based neural networks [58] predict ransomware behavior by analyzing past attack data, but their lack of situational awareness reduces their effectiveness for adaptive threats.
Likewise, lightweight models like those designed for IoT devices incorporate context ontologies for feature extraction [40], which reduces computational complexity. However, these models often block behavioral data, which is critical for understanding ransomware’s adaptive strategies. Similarly, deep learning approaches like LSTM provide early malware predictions on Android devices by analyzing data from active sessions [42], but limited input data disrupts accuracy for long-term predictions.
Addressing the inherent limitations of current predictive models necessitates a paradigm shift: the fusion of operational data with comprehensive situational and threat intelligence. This integration is not merely an enhancement; it is a critical imperative, enriching the model’s knowledge base and empowering it to dynamically adapt to ransomware’s rapidly evolving behaviors and diverse environmental influences. Table 1 provides a critical overview of existing ransomware behavior prediction studies, dissecting their problem statements, proposed solutions, methodologies, tools, and inherent limitations.

2.4. Addressing Prevention Gaps

Existing ransomware defense solutions often focus narrowly on operational and/or managerial aspects, but they ignore situational factors that significantly influence the effectiveness of these strategies. To address this limitation, we propose a comprehensive framework that combines both approaches, allowing the development of situationally aware solutions designed for the context of specific attacks. Moreover, the proposed framework emphasizes predictive situational awareness to trigger active defenses and assess the effectiveness of hardening strategies. By integrating evidence from diverse sources, the model could identify potential ransomware threats early and allow for timely preventive measures. This framework not only provides direction for future research but also serves as a baseline for evaluating current investigations and future work that can build on our framework to create adaptive and context-aware solutions for ransomware prediction and prevention.
To summarize, the capacity of ransomware to masquerade as legitimate software and irreversibly encrypt data renders early detection paramount yet arduous. The reliance on robust cryptographic mechanisms and the rapid evolution of attack patterns impedes conventional detection methodologies, frequently resulting in failures due to data insufficiency within the critical pre-encryption window and the malware’s polymorphic nature. To mitigate these challenges, we use a dual-pronged strategy: (1) leveraging GANs to augment sparse datasets with realistic synthetic samples, and (2) employing adaptive feature selection via mutual information to dynamically prioritize salient features. This approach addresses data scarcity and dimensionality complexities, ensuring model efficacy against evolving ransomware tactics. Furthermore, DBNs are investigated as detection architectures, with training optimizations such as early stopping to mitigate overfitting. This integrated approach enhances detection accuracy, synergistically combining robust modeling techniques with adaptive strategies to counter ransomware’s dynamic behavior.

3. Methodology

This research introduces a novel adaptive feature selection methodology to counter evolving ransomware. We use Incremental Mutual Information and batch processing to update our detection model with the latest attack patterns. We also address model design and training by using dynamic stopping criteria that account for ransomware’s uncertainty and variability. This comprehensive approach aims to boost early ransomware detection accuracy, prevent overfitting, and create more reliable detection models, significantly advancing proactive cybersecurity. The process involves augmentation, feature selection, and model training/testing. First, GANs synthesize attack samples, mimicking real ransomware behavior. Next, in the feature selection phase, we identify critical features from ransomware’s runtime data. This adaptive feature selection keeps our detection model resilient against changing threats. Finally, a DBN is trained on this augmented data with selected features, resulting in a robust early ransomware detection model. Figure 2 shows the full architectural overview.

3.1. Phase 1: GAN Pre-Encryption Data Augmentation

The GAN is used to generate artificial attack data that mimics ransomware behavior during the early stages of the attacks. The early stage of the attack is the timeframe that precedes data encryption, also called pre-encryption. The lack of data and attack patterns is a major challenge that early detection solutions face. In this phase, this data insufficiency challenge is addressed by using GAN to generate data that compensate for the missing and/or unavailable attack patterns. The underlying principle behind GANs involves a game-theoretic approach, where two neural networks, the generator and the discriminator, are trained simultaneously through adversarial processes.
The generator’s job is to create data. Initially, it produces data pretty much at random. Over time, it learns to generate more realistic data, aiming to make its outputs indistinguishable from real data. It does not have access to the actual data but learns from the feedback it receives from the discriminator. The discriminator acts as a critic or judge. It reviews both the real data, and the fake data produced by the generator. Its task is to distinguish between the two, identifying what is real and what is fake. The better the discriminator becomes at distinguishing real from fake, the more pressure it puts on the generator to improve its data generation capabilities.

3.2. Phase 2: Incremental Mutual Information Selection (IMIS)

Mutual information-based incremental selection (IMIS) is employed to extract the most salient feature subset for the ransomware detection model. This technique leverages mutual information to quantify the relevance of candidate features while mitigating redundancy with already selected features. Its non-parametric nature renders it adaptable to both linear and non-linear relationships, and categorical and continuous data types. Unlike correlation, which is limited to linear dependencies, mutual information captures the full spectrum of variable relationships, making it a robust tool for feature selection in complex datasets characterized by intricate, non-linear dependencies.
The core principle of IMIS is to utilize entropy as a measure of the information content a candidate feature contributes towards the target label. High information content translates to high relevance. Subsequently, redundancy between the candidate and already selected features is quantified, and high redundancy leads to a diminished feature significance. This ensures the selected feature set maximizes relevance while minimizing redundancy. Notably, IMIS incorporates incremental learning, enabling dynamic re-evaluation of feature significance upon the arrival of new data, thus empowering the detection model to adapt to evolving ransomware behaviors.
The mutual information feature selection process involves computing mutual information scores between each feature and the target variable, followed by a ranking of features based on these scores. Features exhibiting the highest scores, indicative of maximum information content, are prioritized for model training, while those with low scores are discarded, resulting in a streamlined and potentially more performant model. The culmination of this phase is the derivation of an IMIS-selected feature set, comprising the most relevant and non-redundant features, which serve as input for the detection model in Phase 3.

3.3. Phase 3: Deep Belief Network-Based Ransomware Detection Model

The feature subset extracted by IMIS in Phase 2 serves as the input for training a DBN designed for ransomware detection. A DBN comprises multiple layers of stochastic, latent variables, typically binary, organized into a directed belief network with the exception of the uppermost two layers, which constitute an undirected graphical model. This structural architecture empowers the DBN to efficiently model intricate data distributions and learn deep, hierarchical representations. DBN training is bifurcated into two primary stages: unsupervised pre-training, employing Restricted Boltzmann Machines (RBMs) to initialize network weights, and supervised fine-tuning, which refines these weights for classification. This framework mitigates the challenges inherent in directly training deep architectures via supervised learning, effectively capturing underlying data distributions and initializing the network in a parameter space proximal to the optimal solution.
In the context of ransomware detection, the DBN functions as a classifier, discerning malicious software based on the IMIS-selected feature subset. The DBN is trained on a comprehensive dataset, encompassing known ransomware samples and benign applications generated in Phase 1. Consequently, the model learns to differentiate between these categories by recognizing the deep, hierarchical patterns that distinguish ransomware activities from legitimate software operations. Upon completion of training, the DBN can classify novel, unseen software samples with a high degree of accuracy, effectively distinguishing between malicious and benign entities. The full Python implementations of the BBM-GAN data augmentation, IMIS feature selection, and UA-DES early stopping strategy can be found in Appendix B.

4. Experimental Evaluation and Analysis

This section details our multi-phase framework for early ransomware detection, designed to boost accuracy and lower false positives.
  • Phase 1 uses a Bi-Gradual Minimax GAN (BGM-GAN) to generate synthetic ransomware attack patterns, overcoming data scarcity.
  • Phase 2 employs the IMIS technique to dynamically select relevant features and adapt to evolving ransomware.
  • Phase 3 utilizes a DBN with a UA-DES technique to optimize training and prevent overfitting.
The following sections elaborate on the methodology and results of each phase.

4.1. Dataset, Environment, and Metrics

We built a comprehensive dataset of 8152 crypto-ransomware samples from diverse families like Cerber, TeslaCrypt, CryptoWall, Petya, and WannaCry, reflecting the complexity of current threats. To train accurate detection models, we also included 1000 benign programs from informer.com. This balanced dataset, with its detailed documentation of ransomware families (see Table 2), ensures our research is transparent and reproducible, providing a strong foundation for developing robust ransomware detection mechanisms. Sample rows of the ransomware dataset, including extracted API call features used for model training, are illustrated in Appendix C.
For evaluation, we used Python libraries including Scikit-learn, Pandas, NumPy, and SkFeature. TensorFlow was essential for developing the GAN model’s generator and discriminator networks. We used Anaconda as our integrated development environment and Keras to streamline architecture development and model optimization. Scikit-learn, NumPy, and Pandas also handled data preprocessing and feature extraction. Complementing the malicious samples, the dataset incorporates 1000 benign programs sourced from a reputable application repository, https://www.informer.com accessed on 5 Aug 2023.
Accuracy, detection rate (DR), and false positive rate (FPR) are standard metrics for evaluating malicious program detection, including ransomware, and other machine learning tasks. While accuracy measures overall correctness, DR (also known as recall) indicates the proportion of actual attacks correctly identified. Precision shows how many predicted attacks were truly correct, and FPR quantifies benign instances incorrectly flagged. The F1-score, a balanced metric for precision and recall, is used when both false positives and false negatives are critical. Formal definitions are provided in Equations (1)–(5) below, where TP, TN, FP, and FN denote true positives, true negatives, false positives, and false negatives.
A C C = T P + T N T P + T N + F P + F N
D R = T P T P + F N
P r e c i s i o n = T P T P + F P
F P R = F P F P + T N
F 1 = 2 × P r e c i s i o n × R e c a l l P r e c i s i o n + R e c a l l

4.2. Phase 1

GANs, introduced in 2014, are a major advancement in deep learning. They consist of two competing neural networks: a generator that creates data mimicking a target distribution, and a discriminator that tells real from generated data. This adversarial process iteratively refines both networks, producing increasingly realistic synthetic data. GANs are versatile, used in areas like image and video synthesis, data augmentation, anomaly detection, and are particularly relevant for ransomware detection.
In the context of adversarial attacks, GANs are employed to model the attacker’s objective. Given a sample space X, where x represents a benign sample and g(x) > 0 denotes the classification function yielding a benign result, the attacker aims to generate a malware sample   x *   such that g x * > 0 . This objective can be formally expressed as
x * = arg   max x   g ^ x ,   s . t . d x , x * d m a x
The GAN reduces the loss function value V during the training of both generator G and discriminator D by solving the following optimization function:
min D   max G   V G , D
where
V G , D = E x   log   D x + E z log   1 D G z
Here, z denotes samples drawn from the latent noise distribution. While existing GAN-based malware detection methods show promise, their efficacy in early ransomware detection is limited by the inherent scarcity of ransomware samples. This scarcity results in a poorly defined empirical estimate of the authentic ransomware data distribution, leading to substantial divergence from the generator’s output distribution. Consequently, the discriminator frequently rejects synthetic samples, hindering the generator’s ability to learn and produce realistic ransomware examples. To address this, our algorithm is structured into two distinct phases: a GAN-based data augmentation phase, comprising a generator and discriminator, followed by an early detection phase that leverages the augmented dataset.

4.2.1. GANs Generative Adversarial NWs

The GAN generates artificial pre-encryption attack patterns from real ransomware data. This addresses data insufficiency in the pre-encryption phase by adding realistic, fictional samples to the dataset.
The discriminator network evaluates input samples by propagating them through its constituent layers, thereby computing a probabilistic score that quantifies the likelihood of a given sample’s provenance—specifically, its authenticity versus its synthetic origin. Throughout the iterative training process, the generator network refines its capacity to synthesize increasingly realistic data, while the discriminator concurrently enhances its ability to discriminate between authentic and synthetic exemplars. This adversarial dynamic compels the generator to produce synthetic samples of progressively heightened fidelity, which, in turn, drives the discriminator towards improved discriminative performance.
Figure 3 illustrates the fundamental GAN architecture, comprising a generator and a discriminator engaged in an adversarial relationship. The generator synthesizes synthetic ransomware instances, emulating real attack patterns to create realistic training data. These instances are presented to the discriminator, which endeavors to classify them as authentic or artificial. The generator aims to deceive the discriminator by producing synthetic samples whose probability distribution increasingly approximates that of authentic ransomware. Conversely, the discriminator is optimized to accurately distinguish between authentic and synthetic attacks. Successful discrimination provides feedback to the generator, prompting parameter readjustment to generate synthetic instances that more closely resemble authentic ones. This iterative process drives both networks towards a Nash equilibrium (Equations (6)–(8)). Upon completion of this adversarial training, the resulting balanced dataset of authentic and high-fidelity synthetic pre-encryption ransomware samples forms the basis for training the subsequent early detection module.
Refined Minimax Loss: The Enhanced Bi-Gradual Approach
GANs rely on loss functions to measure the difference between the probability distributions of real and generated data. To improve upon the standard Minimax loss (Equation (6)), we propose the Bi-Gradual Minimax loss function. While the generator and discriminator use separate probability distributions for their respective loss calculations, both derive their final loss value from the unified formula presented in Equation (9).
V G , D = E x log   D x + E z 1 log   1 D G z
In a GAN, the discriminator, denoted as D(x), estimates the probability that a real data instance x is authentic. The generator, G(z), produces synthetic data from a noise vector z. Consequently, D(G(z)) represents the discriminator’s assessment of the probability that a generated instance is real. The expected values Ex and Ez are taken over real data instances x and noise vectors z (or, equivalently, generated instances G(z)), respectively.
To refine the probability estimation, particularly when training a GAN-based early detection model with pre-encryption data, we introduce a gradual up-weighting coefficient, represented by ∂. This coefficient modulates the discriminator’s and generator’s estimations, and its calculation is detailed in Equation (10).
= 1 + a R
The gradual coefficient, ∂, is defined as the ratio a/R, where R represents the fixed number of real data instances and a represents the growing number of synthetic instances. Therefore, is directly proportional to a. In the early stages of training, when a is small, ∂ is also small because R is much larger than a. As the generator produces more synthetic samples, a increases, leading to a corresponding increase in ∂. This dynamic adjustment of ∂ allows the loss function to adapt, starting with a relaxed constraint and gradually tightening it as more synthetic data becomes available. This is particularly beneficial for early ransomware detection, where initial data is often limited. Consequently, the GAN discriminator’s constraints transition from lenient to stringent as the volume of generated synthetic attack patterns grows.
To dynamically adjust the upper bound of loss estimation in the Minimax loss function, we introduced the coefficient ∂. This adaptation is crucial during the pre-encryption phase of ransomware attacks, where probability distributions are highly variable. Initially, with few synthetic instances, the discriminator’s term in the loss function (Equation (6)) has minimal influence, allowing the generator’s term to dominate and produce viable attack patterns. When the discriminator’s term is minimized due to this imbalance, misclassification of synthetic patterns as real is more likely. However, as the number of generated synthetic attack patterns increases, the discriminator’s influence in Equation (6) grows, while the generator’s influence diminishes. This shift empowers the discriminator to more accurately distinguish synthetic instances from real ones.

4.2.2. Early Detection with Feature Selection

In Phase 1, the augmented dataset is used to train an LSTM-based ransomware detection model. Feature selection is performed using mutual information feature selection (MIFS), to select the most informative features, as defined in Equation (11).
J X k = I X k ; Y β X j ϵ S I X j ; X k + γ X j ϵ S I X j ; X k Y
In this equation, I(Xk;Y) represents the mutual information between the candidate feature Xk and the class label Y, and I(Xj;Xk∣Y) denotes the conditional mutual information between Xk and selected features Xj (from set S), given the class label Y. The coefficients β and γ range from 0 to 1. By reducing data dimensionality through salient feature selection, MIFS helps prevent overfitting, enhances detection accuracy, minimizes false positives, and simplifies model complexity, making it suitable for real-time applications like early ransomware detection. The algorithm ranks features by entropy, selecting the top n features for input into the LSTM network.
The LSTM network was chosen for the detection module due to its inherent capacity to capture temporal dependencies, a crucial attribute for early ransomware detection. The LSTM’s cell state, with its memory mechanism for recalling past information, facilitates tracking polymorphic ransomware behavior during the pre-encryption phase, enabling effective monitoring. The LSTM network incorporates three gate types: input (Equation (12)), forget (Equation (13)), and output (Equation (14)):
i t = σ ω i h t 1 , x t + b i ,
i f = σ ω f h t 1 , x t + b f ,
i o = σ ( ω o [ h t 1 , x t + b o ] )
The variables i t ,   i f ,   a n d   i o denote the input, forget, and output gates, respectively. During training, the LSTM network utilizes the selected features and data for model optimization. The model comprises input, hidden, and output layers. The number of input layer nodes corresponds to the number of features selected by MIFS. These nodes transmit data to the hidden layers by multiplying it with the input weights. The hidden layers, whose number and nodes are optimized during training via bias adjustments, process data using activation functions. The Rectified Linear Unit (ReLU) function, as defined in Equation (15), serves as the activation function for all hidden layer nodes, except for those in the layer preceding the output, where the sigmoid function from Equation (16) is employed. The output layer receives input from the final hidden layer’s sigmoid activations and classifies instances as malicious or benign based on a threshold. Instances with activation values exceeding 0.5 are classified as malicious; however, this threshold is adjustable.
R x = max 0 , x
x = 1 1 + e x
The LSTM model employs 10-fold cross-validation, partitioning the dataset into 90% training data and 10% testing data. The training data is used to construct the model, while the testing data is used to evaluate its performance. This process is iterated 10 times, with the accuracy recorded for each iteration. The average accuracy across all iterations is then calculated to determine the model’s overall performance.

4.2.3. Performance Evaluation

This section details the facilities and setup used for our analysis, including data engineering (i.e., construction of a crypto-ransomware binary corpus), feature selection, correlation coefficient calculation, weighting factor management, and the formulation of an adjustment function. Table 3 and Table 4 present accuracy and training time data across various epochs, while Figure 4, Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9 provide a comparative visual representation of the results.
  • Experimental Facilities
The experimental setup was conducted utilizing a suite of Python libraries. Scikit-learn, Pandas, NumPy, and SkFeature were employed for data analysis and evaluation. The GAN was implemented using TensorFlow within the Anaconda integrated development environment (IDE), with Keras facilitating streamlined architecture design and optimization. Scikit-learn, NumPy, and Pandas were used for data preprocessing and feature extraction.
  • Corpus of crypto-ransomware binaries
The dataset used in this study consists of a total of 9152 binary samples, comprising 8152 crypto-ransomware binaries sourced from the public repository, VirusShare (http://www.virusshare.com, accessed on 14 March 2023) repository [60,61,62,63,64]. This corpus comprises 8152 samples, representing diverse ransomware families including Cerber, TeslaCrypt, CryptoWall, Petya, and WannaCry. These samples were collected between September 2016 and August 2017. Additionally, 1000 benign programs were downloaded from informer.com [63,64,65,66], a widely used repository for Windows-based applications. These files, commonly referred to as portable executable (PE) files, are fundamental to malware analysis. PE files serve as the standard executable format for object code and dynamic-link libraries (DLLs) in Windows operating systems. Both static and dynamic analyses of PE files are crucial for comprehending the structure, functionalities, behavior, and potential impact of ransomware. The dissection of PE files enables the extraction of valuable metadata, the identification of malicious signatures, and the understanding of ransomware behavior, including encryption methods, server communication, and persistence mechanisms. Binary analysis is essential for developing countermeasures and detection signatures, as well as for understanding ransomware tactics. In this study, dynamic analysis was employed, utilizing the PE file within a sandboxed environment.
  • Data Engineering
A diverse corpus of benign applications was compiled, including compression, encryption, editing, office, developer, multimedia, driver, browser, and game software. Each application was rigorously verified using VirusTotal, a platform utilizing 56 antivirus (AV) engines for malware classification. Samples flagged as malicious by fewer than five AV engines were excluded, ensuring only applications trusted by all fifty-six engines were retained. Both ransomware and benign software were then executed and analyzed in the Cuckoo Sandbox. This environment meticulously monitored the resulting processes, generating distinct API trace files for each sample. These trace files formed the primary dataset for this study.
  • Feature selection
In our previous research, we employed enhanced mutual information feature selection (EMIFS) to identify the most salient features for the pre-encryption stage of the crypto-ransomware lifecycle. We conducted experiments with varying epochs, utilizing feature counts ranging from 5 to 50, in increments of 5. The results demonstrated that accuracy fluctuated with the number of epochs. The dataset was partitioned into training and testing sets using 10-fold cross-validation. Classifier accuracy was evaluated using the testing data.
  • Compilation and comparison of results
To demonstrate the efficacy of our BGM-GAN technique, we compared its performance with GAN [67], CNN [68], and DBN [69] models. Feature set sizes ranging from 5 to 50, in increments of 5, were evaluated experimentally. Table 3 shows the accuracy results based on number of epochs. Figure 4, Figure 5, Figure 6 and Figure 7 illustrate the classification accuracy results, demonstrating that BGM-GAN outperforms the other models.
Figure 4 compares the performance of our BGM-GAN against standard GAN, Convolutional Neural Network (CNN), and DBN models, trained for 30 epochs across varying feature counts. BGM-GAN demonstrates a consistent improvement in accuracy with increasing features, peaking at 0.939 with 45 features and maintaining high performance even with a minor drop to 0.938 at 50 features. The standard GAN model reaches a maximum accuracy of 0.930 at 25 features, declining from 0.891 at 5 features to 0.916 at 50 features. The CNN model peaks at 0.929 with 30 features, starting at 0.865 and ending at 0.919. The DBN model shows the least variability, peaking at 0.914 with 20 and 30 features, and ending at 0.906. Overall, BGM-GAN consistently outperforms the other models, reaching the highest accuracy of 0.939 at 45 features, as shown in Figure 4, Figure 5, Figure 6 and Figure 7.
Figure 5 compares the performance of BGM-GAN against standard GAN, CNN, and DBN models, all trained for 90 epochs and evaluated across varying feature counts. BGM-GAN demonstrates strong initial accuracy, starting at 0.934 with five features and peaking at 0.951 with ten features. Though accuracy dips to 0.931 at thirty features, it rebounds, reaching a second peak of 0.953 at forty features before a slight decline to 0.922 at fifty features. In contrast, the standard GAN model peaks at 0.927 with thirty features, starting at 0.882 and stabilizing at 0.927 at fifty features. The CNN model reaches a peak of 0.924 at forty features, starting at 0.874 and ending at 0.916. The DBN model peaks at 0.932 with thirty features, starting at 0.884 and ending at 0.916. Despite feature-dependent variations in accuracy across all models, BGM-GAN consistently outperforms the others, achieving peak accuracies of 0.951 and 0.953 at ten and forty features, respectively.
Figure 6 compares the accuracy of BGM-GAN, standard GAN, CNN, and DBN models, all trained for 150 epochs, across varying feature counts. BGM-GAN demonstrates a steady increase in accuracy, starting at 0.942 with five features and peaking at 0.984 with fifty. Though it experiences a slight dip to 0.950 at fifteen features and 0.976 at forty, BGM-GAN consistently outperforms the other models. In contrast, the standard GAN model peaks at 0.961 with twenty-five features, declining to 0.945 at fifty, with a low of 0.879 at fifteen. The CNN model peaks at 0.949 with forty-five features, ending at 0.899. The DBN model’s performance fluctuates, peaking at 0.944 with thirty-five features and ending at 0.930. BGM-GAN’s consistent upward trend and peak accuracy of 0.984 highlight its superiority.
Figure 7 compares the performance of BGM-GAN, standard GAN, CNN, and DBN models, all trained for 210 epochs, across varying feature counts. BGM-GAN demonstrates a consistent upward trend, starting at 0.926 with five features and peaking at 0.995 with fifty, highlighting its robustness. In contrast, standard GAN fluctuates, peaking at 0.979 with thirty features and ending at 0.977. The CNN model peaks at 0.959 with twenty-five features, and the DBN model at 0.950, also with twenty-five features. BGM-GAN consistently outperforms the others, achieving the highest accuracy of 0.995.
Figure 4, Figure 5, Figure 6 and Figure 7 demonstrate that our BGM-GAN model consistently achieved superior detection accuracy compared to the GAN model presented in [67] across all training epochs. Furthermore, BGM-GAN outperformed other deep learning models, including CNN and DBN. This superior performance underscores the efficacy of our Bi-Gradual Minimax loss function in accurately estimating the divergence between real and synthetic data distributions, even when confronted with limited pre-encryption ransomware attack data. These results validate our hypothesis that prior research overlooked the detrimental impact of data scarcity on generator and discriminator performance, thereby hindering the production of realistically metamorphic ransomware samples.
The comparative results depicted in Figure 4, Figure 5, Figure 6 and Figure 7 reveal that accuracy generally improves with an increase in feature count, up to a critical threshold. Beyond this threshold, accuracy plateaus or diminishes. The optimal feature count for maximizing accuracy is contingent upon the number of training epochs. For example, with 30 training epochs, peak accuracy is observed at 45 features, whereas with 90 epochs, optimal performance is attained at 20 features.
The observed accuracy declines are attributed to overfitting, a consequence of increased feature counts and training epochs. As the number of features increases, the dimensionality of the data also escalates. This heightened dimensionality adversely affects the detection model’s accuracy, particularly when handling data with insufficient ransomware behavior patterns from early phases. Moreover, as epoch counts increase, the risk of overfitting intensifies, diminishing the loss function’s effectiveness in measuring divergences between real and synthetic patterns. This phenomenon explains the accuracy decline observed beyond certain feature and epoch thresholds. Table 4 demonstrates BGM-GAN’s linear training time scaling with epochs (2–4 ms/step, ~2 s/epoch).
Figure 8 and Figure 9 show that our BGM-GAN model outperforms existing techniques in recall and false positive rate across varying feature counts and training epochs. This enhanced performance is attributed to BGM-GAN’s ability to capture early attack patterns with limited data, consistent with Figure 4, Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9.
In summary, this model introduces a novel approach to early-stage ransomware attack detection, addressing the critical challenge of limited and rapidly evolving attack patterns. Unlike prior studies that relied on static feature sets, which are quickly rendered obsolete by the dynamic nature of ransomware, this model leverages GANs for dynamic data augmentation. By integrating an enhanced loss function into the GAN, the model generates more accurate and representative attack patterns, significantly improving detection performance. This advancement addresses a significant gap in contemporary cybersecurity research and practice, enhancing both the speed and efficacy of ransomware detection.

4.3. Phase 2

To adapt to the evolving nature of ransomware, our model employs Incremental Mutual Information (IMI). This method dynamically recalculates feature relevance with each new data batch, ensuring the detection model remains sensitive to emerging attack patterns and maintains optimal feature selection for early detection.
To mathematically define IMI’s feature relevance update, let X represent the input feature matrix and Y represent the target class vector. Given a feature set Let X = { x 1 , x 2 , . . . , x n } and target variable Y , the mutual information between feature x i and target Y is denoted as I ( x i ; Y ) .
The dynamic update process begins with calculating the initial mutual information for each feature relative to the target using
I ( x i ; Y ) for   i = 1,2 , . . . , n
When new data arrives, the mutual information for each feature is recalculated and updated as follows. Let Xnew represent the new data. The updated mutual information is given by
I n e w x i ; Y = α I p r e v x i ; Y + 1 α I x i ; Y X n e w
where I p r e v ( x i ; Y ) is the previous mutual information value and α is a weighting factor ( 0 α 1 ) that balances the impact of new data versus historical data. If new features x n + 1 , x n + 2 , . . . , x n + m are added, calculate I ( x n + j ; Y ) for j = 1,2 , . . . , m .
We periodically evaluate feature relevance by updating mutual information scores and deprioritize and remove features with significantly lower scores based on the desired feature count. The model adjustment feedback loop is guided by performance metrics (e.g., accuracy, precision) that trigger feature set re-evaluation if performance deteriorates below a predefined threshold. The weighting factor (α) in dynamic feature selection balances the impact of historical and new data, determining the influence of past mutual information (MI) values relative to newly calculated MI. α is adaptively adjusted through correlation analysis that ensures an optimal balance by assessing the relationship between historical and incoming data. The mathematical formulation is next.
  • Correlation Coefficient Calculation
Let X h i s t represent the historical data and X n e w represent the new data for a certain feature. Calculate the Pearson correlation coefficient, denoted as r , between X h i s t and X n e w . The formula for Pearson correlation coefficient ρ is
ρ = ( X h i s t X ¯ h i s t ) ( X n e w X ¯ n e w ) X h i s t X ¯ h i s t 2 X n e w X ¯ n e w 2
Here, X ¯ h i s t and X ¯ n e w are the means of the historical and new data, respectively.
  • Correlation-Based Adjustment of the Weighting Factor
The correlation coefficient r ranges from −1 to 1, where 1 indicates a perfect positive linear relationship, −1 indicates a perfect negative linear relationship, and 0 indicates no linear relationship.
The value of r can be used to adjust α . For example,
If ∣r∣ is high (close to 1), it implies that the new data is highly correlated with the historical data. In this case, a higher α may be appropriate, as it suggests that historical data is still very relevant.
If ∣r∣ is low (close to 0), it indicates that the new data is not well-correlated with the historical data. A lower α might be more suitable in this scenario to give more weight to the new data.
  • Threshold-Based Adjustment Function for Weighting Factor Stability
A threshold mechanism is employed to prevent significant variations in α resulting from minor fluctuations in r. If the change in r is less than the threshold, α is maintained at its current value. This adaptive strategy enables α to dynamically respond to evolving data relationships, ensuring feature selection remains pertinent to contemporary trends, which is essential for ransomware attack detection.

4.3.1. IMIS-DBN Integration

The integration of IMIS with a DBN significantly enhances ransomware detection accuracy. DBNs are adept at learning intricate patterns from high-dimensional ransomware data. IMIS’s continuous evaluation and dynamic adjustment of feature selection, based on evolving attack patterns, ensures the DBN is trained on a compact, relevant feature subset. This integration not only improves detection accuracy but also optimizes computational resource utilization. The process operates in two distinct phases: initially, IMIS selects features based on their mutual information scores relative to the target class; subsequently, IMIS dynamically updates this feature subset with new data, ensuring the DBN utilizes current information. This incremental approach is efficient, scalable, and particularly beneficial for resource-constrained systems.
In the second phase, the IMIS-selected feature subset serves as input for the DBN, facilitating deep learning-based ransomware detection. The DBN’s layered architecture extracts hierarchical representations, crucial for identifying complex threats. IMIS’s adaptability prevents the DBN from being overwhelmed by data volume or misled by obsolete features, which is vital in rapidly evolving cyber threat landscapes. IMIS’s dynamic feature selection enables the detection of both known and novel threats, fostering proactive defense against evolving malware.
Algorithm 1 (below) presents the pseudocode for IMIS, which systematically selects and updates ransomware features for effective detection. This framework ensures IMIS efficiently adapts to new data patterns while maintaining computational efficiency, rendering it particularly effective for dynamic ransomware behavior.
Algorithm 1. Incremental Mutual Information Selection (IMIS) [70].
Input:
   Data_Batches: Stream of data batches from devices
   Target_Class: The class variable for intrusion detection (e.g., normal or attack)
   Alpha: Weighting factor for balancing historical and new data (initially set)
   Threshold: Threshold for significant change in mutual information
Output:
   Selected_Features: Set of features selected for intrusion detection
Procedure IMIS (Data_Batches, Target_Class, Alpha, Threshold):
   Initialize Historical_MI as an empty dictionary
   Initialize Selected_Features as an empty set
   for each Batch in Data_Batches:
      Current_MI = CalculateMutualInformation(Batch, Target_Class)
      Historical_MI = UpdateFeatureRelevance(Historical_MI, Current_MI, Alpha)
      Selected_Features = SelectAndUpdateFeatures(Historical_MI, Selected_Features, Threshold)
      Yield Selected_Features
Procedure CalculateMutualInformation(Batch, Target_Class):
   return {Feature: ComputeMutualInformation(Feature, Target_Class) for Feature in Batch}
Procedure UpdateFeatureRelevance(Historical_MI, Current_MI, Alpha):
   return {Feature: Alpha ∗ Historical_MI.get(Feature, 0) + (1 − Alpha) ∗ MI for Feature, MI in Current_MI.items()}
Procedure SelectAndUpdateFeatures(Historical_MI, Selected_Features, Threshold):
   return {Feature for Feature, MI in Historical_MI.items() if MI > Threshold or Feature in Selected_Features}

4.3.2. Training for Adaptive Detection

This section details the architecture, configuration, and evaluation of the IMIS-DBN model, a framework designed for enhanced ransomware detection. By integrating IMIS for dynamic feature selection with the deep learning capabilities of a DBN, the model facilitates the identification of both established and emergent attack patterns. IMIS acts as the initial layer, adaptively selecting and updating relevant features from ransomware data streams. The DBN component was configured with 100 training epochs, a batch size of 64, L2 regularization of 0.0002, momentum of 0.7, and a learning rate of 0.05. Initially, IMIS employs mutual information scores to select features, reducing data dimensionality while preserving crucial information. Subsequently, as new data is introduced, IMIS dynamically updates the feature set by recalculating mutual information and adjusting feature relevance. As depicted in Figure 10, the model comprises two primary modules: the IMIS feature selection module and the DBN detection classifier. IMIS processes the dataset through a series of steps, including initial relevance estimation, weight adjustment, relevance score updates, and top-n feature selection. The resulting feature subset is then used as input for training the DBN classifier.
The DBN architecture is composed of stacked Restricted Boltzmann Machines (RBMs), each comprising visible and hidden units. This model incorporates a hierarchical structure of five hidden layers, with each successive layer reducing the unit count by 30% relative to its predecessor. The initial layer receives input processed by the IMIS module, and subsequent layers progressively extract higher-level data representations. Each RBM undergoes unsupervised pre-training, commencing with the bottom layer, wherein they learn to reconstruct inputs and model the underlying data distributions. This pre-training phase initializes network weights, facilitating subsequent supervised fine-tuning. Following pre-training, the DBN is subjected to supervised fine-tuning using labeled data, aiming to minimize classification errors and optimize detection accuracy. The efficacy of the trained IMIS-DBN model is evaluated using an independent test dataset, with performance metrics including accuracy, precision, recall, and F1-score used to assess its ability to discriminate between benign and malicious activities.

4.3.3. Performance Evaluation of IMIS

This section compares our IMIS technique against established feature selection methods like RCGU, EMRMR, MIFS, and JMI for ransomware detection [71]. We used Python 3.11.7 with libraries such as Scikit-learn, Pandas, NumPy, SKFeature, and TensorFlow, running experiments on a Windows 10 workstation. We evaluated each technique’s accuracy, FPR, DR, and F1-score across various feature set sizes. Unlike static methods, IMIS dynamically updates feature relevance, giving it a key advantage as ransomware evolves.
The evaluation rigorously assessed IMIS’s effectiveness in dynamic ransomware detection, benchmarking its real-time feature relevance against the static nature of the other techniques. Our setup allowed a direct comparison of adaptability and performance. IMIS’s unique incremental approach, continuously refining feature relevance with new data, was the central focus of this investigation.
As shown in Figure 11, IMIS consistently outperformed other methods across feature counts from 5 to 50. It achieved a strong initial accuracy of 0.949 with just five features, demonstrating its quick analytical capability. IMIS peaked at 0.979 accuracy with 25 features, showing significant performance gains in this range. Its sustained advantage, especially over RCGU, stems from its dynamic and adaptive re-evaluation of feature importance, keeping it aligned with evolving ransomware. This adaptability, a key differentiator, validates IMIS’s potential for real-time, proactive threat detection.
Figure 12 compares FPR for IMIS, RCGU, EMRMR, and MIFS (5–50 features). IMIS consistently shows lower FPR, starting at 0.175 with 5 features and reaching 0.104 at 25. While IMIS and RCGU match at 30 features (0.123), IMIS remains competitive beyond, outperforming at 40 and 45 features and maintaining a lower FPR (0.150) at 50. IMIS’s iterative feature reassessment ensures relevance to evolving ransomware, reducing false positives.
Figure 13 illustrates the DR comparison between IMIS, RCGU, EMRMR, and MIFS. IMIS achieves a high detection rate across all feature set sizes, starting at 0.913 for 5 features and peaking at 0.942 with 25 features, outperforming all other techniques. RCGU follows closely at 0.934, but IMIS maintains a consistent lead at 15, 25, 35, and 40 features. Even at 50 features, IMIS upholds a strong DR of 0.927, while other techniques see a noticeable drop in performance. This improvement comes from IMIS’s ability to balance historical and new data and enhance feature selection based on evolving attack patterns. Unlike traditional MI-based methods that use static feature importance, IMIS updates feature relevance to ensure the detection model is responsive to new and existing ransomware threats.
Figure 14 provides a detailed comparative analysis of the F1-score performance between IMIS and its competing methodologies across a comprehensive range of feature set sizes (5–50). The data unequivocally establishes IMIS’s consistent dominance, characterized by superior F1-score values throughout the entire spectrum. Commencing with a robust F1-score of 0.935 at 5 features and culminating in a peak performance of 0.950 at 20 features, IMIS demonstrates its exceptional capacity for balanced precision and recall. While a marginal convergence in F1-scores is observed as the feature count increases, IMIS steadfastly maintains its preeminence across all feature dimensions. This sustained performance superiority underscores IMIS’s adeptness at harmonizing accuracy and recall, thereby ensuring both high detection rates and minimal false positive occurrences. In stark contrast to conventional mutual information (MI)-based feature selection techniques, which operate within a static evaluation paradigm, IMIS employs a dynamic and adaptive reassessment of feature relevance based on the influx of new data. This dynamic adaptation guarantees the selection of only the most pertinent features, resulting in enhanced classification performance against the ever-evolving landscape of ransomware threats.
As shown in Figure 11, Figure 12, Figure 13 and Figure 14, F1-score consistently served as a more balanced and robust metric across varying feature sizes. This was particularly important given the dataset’s class imbalance. That ensures a fair assessment of model performance on both benign and ransomware samples.
Table 5 presents the computational efficiency of IMIS compared to other techniques based on Python profiling. IMIS demonstrates significant performance improvements in terms of execution time, total runtime, and training duration.
IMIS exhibits the shortest per-call execution time (0.01 s) and lowest total runtime (3.5 min), demonstrating a substantial performance advantage over other methods. This reduction in computational overhead is attributed to IMIS’s selective feature update mechanism, which circumvents superfluous re-computation by dynamically reassessing only pertinent features upon the arrival of new data.
Table 6 presents the top 10 API call features identified by IMIS, categorized by functionality. These features correspond to critical ransomware behaviors, including encryption, file manipulation, and network communication. These findings underscore IMIS’s capability to prioritize ransomware-specific features, thereby enhancing detection accuracy by focusing on API calls most frequently exploited in ransomware attacks.

4.4. Phase 3

In the age of digital technology, devices are commonly interconnected, which facilitates data exchange and simplifies communication for users. This connection introduces various security risks to user and business data [60]. Among these risks, malware attacks, particularly ransomware, pose significant threats by encrypting user data, and often a ransom is demanded for decryption [11,73]. However, paying the ransom does not guarantee data recovery [74]. Detecting ransomware early is crucial to mitigating its impact. Prior studies [10,16,75] emphasize the importance of early detection using machine learning to identify ransomware before encryption.
Deep learning has emerged as a powerful tool in malware detection, which improves the traditional signature-based methods. Studies highlight the advantages of deep learning in IoT security [76], Android malware defense [77], and dynamic malware analysis [78,79]. The adaptability of deep learning allows for quick analysis of attack patterns and improves detection and prevention [80,81,82,83]. However, overfitting remains a challenge, and early stopping mechanisms can help mitigate it by pausing training before performance goes down [84].
Existing early stopping techniques primarily rely on validation accuracy [85,86,87], but static criteria may lead to underfitting or missed opportunities for better generalization [88]. Dynamic stopping approaches address these limitations by adapting to the training differences [89]. However, current methods often fail to integrate uncertainty and variability, which can lead to the most suitable stopping decisions. Due to the lack of ransomware datasets, our framework contains regularization techniques, data augmentation, and active learning to enhance model performance.

4.4.1. UA-DES: Mathematical Steps and Algorithm

To optimize the accuracy and efficiency of DBN training for ransomware detection, we developed an Uncertainty-Aware Dynamic Ensemble Selection (UA-DES) approach. This methodology employs Bayesian principles to model performance uncertainty, facilitating more informed decision-making throughout the training process. Specifically, we utilize dropout as a Bayesian approximation to quantify predictive uncertainty and implement Temperature Scaling to refine probability estimates. Furthermore, an active learning framework is incorporated to prioritize the selection of high-information samples, thereby maximizing training efficiency.
The central innovation of Uncertainty-Aware Dynamic Ensemble Selection (UA-DES) resides in its dynamic stopping criterion. This criterion incorporates not only performance gains but also the model’s predictive uncertainty and predefined quality benchmarks. By integrating these multifaceted factors, we ensure robust and reliable model generalization, culminating in enhanced accuracy and efficacy in ransomware detection. Figure 15 provides a schematic representation of the UA-DES architecture.
To substantiate the implementation of UA-DES in DBN training, we have developed a rigorous mathematical formulation. This formulation precisely defines the constituent elements and procedural steps, providing a transparent and unambiguous framework for practical application.
The UA-DES technique is designed to enhance the training process of a DBN-based ransomware detection model. This framework consists of five key steps:
  • Step 1. Bayesian Performance Modeling
  • Performance Evaluation Based on Posterior Distribution:
Let y be the actual label and y ^ be the label predicted by the DBN, which can be ransomware or benign. The performance metric P (e.g., accuracy, precision) can be modeled as
P ( θ D ) = P D θ P θ P D
Within the DBN framework, θ denotes the model parameters, D represents the observed data, P (D\ θ) signifies the likelihood of the data given the parameters (model evidence), P(θ) represents the prior distribution of the parameters, and P(D) denotes the marginal likelihood of the data. Guided by empirical best practices and prior research, the DBN was configured for optimal performance with the following parameters: a batch size of 64, L2 regularization of 0.0002, momentum of 0.7, dropout rate of 0.2, and a learning rate of 0.05. To ensure the network focused on the most informative signals, API-based features were preselected using mutual information feature selection.
  • Uncertainty Estimation:
Uncertainty in the performance metric P can be quantified by the variance of its posterior distribution:
σ P 2 = V a r [ P ( θ D ) ]
  • Step 2. Bayesian Approximation via Dropout: Stochastic Inference in DBNs
Bayesian inference within the DBN was approximated using stochastic forward passes with dropout. A dropout rate of 0.2 was implemented during training to simulate sampling from the posterior distribution and mitigate overfitting. By randomly deactivating neurons, dropout forced the network to learn more generalizable features. This stochasticity was limited to training; dropout was disabled for deterministic validation and testing. Training performance was used to optimize network weights and biases, while validation and testing metrics provided a comprehensive evaluation of predictive performance.
For each pass n , obtain prediction y n , then calculate the predictive uncertainty as
U n c e r t a i n t y = 1 N n 1 N y ^ n y ^ ¯ 2
where y ^ ¯ is the mean prediction over the N passes.
  • Step 3. Calibration for Reliable Probability Estimates
After obtaining the raw model output probabilities p , apply a calibration function f to adjust these probabilities:
c a l i b r a t e d = f ( p )
Temperature Scaling (TS) is a post-processing calibration technique that refines SoftMax outputs to better reflect true probabilities, without altering the model’s architecture or prediction order. By adjusting output probabilities, TS improves the model’s ability to distinguish threats, reducing false alarms. Calibrating the temperature parameter on a validation set aligns predictions with actual results, enhancing generalization and reliability, thus ensuring UA-DES-DBN’s effectiveness and maintaining predictive performance despite early stopping. The TS calibration function operates as follows. Let z represent the logits, which are the raw outputs from the DBN model before applying the SoftMax activation. In other words, logits are the values produced by the neural network before conversion into probabilities. The standard SoftMax function, which transforms these logits into probabilities, is defined as
P y = i x = e z i j e z j
where y is the predicted class, x is the input, z i is the logit for class i and the denominator sums over all possible classes. Temperature Scaling introduces a temperature parameter T to modify the SoftMax function. The adjusted SoftMax function becomes
P T y = i x = e z i / T j e z j / T
Here, T is a scalar that adjusts the “sharpness” of the probability distribution. A higher T makes the distribution softer (more uniform), while a lower T makes it sharper. Calibration seeks to adjust the model’s predictive probabilities to match the true likelihood of outcomes by finding the optimal temperature. This process involves minimizing a loss function, with the Negative Log-Likelihood (NLL) being the commonly used metric, on a validation dataset:
N L L = x , y V a l i d a t i o n   S e t log   P T ( y | x )
The objective is to find
T * = arg   min T   N L L ( T )
where T * is the temperature that minimizes the N L L over the validation data. Once T * is determined, the model’s final output probabilities are adjusted using this optimal temperature:
P T * y = i x = e z i / T * j e z j / T *
This calibrated probability distribution is applied to all future predictions, helping align the model’s confidence with real outcomes. This improves reliability and enhances decision-making accuracy in ransomware detection.
The “output probabilities” in our DBN-based ransomware detection model represent the model’s predicted likelihoods of a network event belonging to either the ransomware or benign class. This results in a two-element probability vector, where the probabilities sum to one. This practice of generating class probability vectors, even in binary classification, is a common and flexible design choice in machine learning, facilitating future multi-class extensions.
  • Step 4. Active Learning Framework
The selection of training samples is driven by maximizing expected information gain, a metric that quantifies the reduction in model uncertainty. Specifically, samples are chosen whose incorporation into the training set would yield the highest post-selection entropy, as evaluated by the current model state. This targeted approach prioritizes samples residing in regions of high uncertainty, thereby enabling the model to efficiently refine its predictive accuracy and robustness. By focusing on these information-rich, high-entropy samples, the model strategically addresses its knowledge gaps, leading to a more effective learning process. The information gain, I G ( x ) for a sample x can be defined as
I G x = H ( y ^ ) E p θ D [ H ( y ^ x , θ ) ]
where H represents entropy, a measure of uncertainty, and E p θ D H y ^ x , θ denotes the expected entropy over the posterior distribution of the model parameters. To efficiently train our framework, particularly with large, unlabeled datasets, we employ an uncertainty sampling strategy. This approach selectively labels data samples where the model exhibits the highest prediction uncertainty, minimizing the need for exhaustive labeling. We quantify this uncertainty using an entropy-based measure, which guides the selection of the most informative samples.
H y x = p P y = i x l o g P y = i x
The term H ( y x ) represents the entropy of the predicted class probability distribution for a given data sample x. This entropy is calculated based on P ( y = i x ) , which is the model’s estimated probability that x belongs to class i. Consequently, higher entropy values indicate that the model’s prediction is less confident.
  • Step 5. Dynamic Stopping Criteria
Training termination is governed by a composite stopping criterion, incorporating an accuracy performance improvement threshold Δ P , predictive uncertainty   σ t h r e s h o l d 2 , and calibration quality C . This multifaceted approach is designed to mitigate overfitting and enhance detection accuracy through early stopping. Given that accuracy is the primary objective, accuracy-related metrics are prioritized. Empirical evaluations have validated the efficacy of this methodology, demonstrating that our model surpasses those presented in related studies. Training ceases when
Δ P < ϵ   and   σ p 2 < σ t h r e s h o l d 2   and   C > C m i n
where ϵ is a small positive value indicating the minimum acceptable performance improvement, σ t h r e s h o l d 2 is the maximum acceptable uncertainty level, and C m i n   is the minimum calibration quality threshold. The use of the AND operator in our stopping criteria is primarily intended to optimize protection against overfitting, a prominent concern in ransomware detection. This technique guarantees that the model continues training until it meets all conditions, avoiding early termination based on a single criterion, which could undermine the model’s ability to generalize. This is especially important due to the nature of ransomware early detection, which should happen as early as possible before the encryption phase takes place.
The mathematical formalization presented in Steps 1–5 establishes a rigorous foundation for the Uncertainty-Aware Deep Ensemble System (UA-DES) technique. This framework enables systematic early stopping in DBN training for ransomware detection by quantitatively evaluating performance, uncertainty, calibration, and information gain. Ultimately, this optimization enhances model generalization and accuracy. Algorithm 2 details the pseudocode for the UA-DES technique’s integration with the DBN.
The UA-DES algorithm, integrated into DBN training for ransomware detection, aims to mitigate overfitting and enhance model generalization. It initiates DBN training with predefined parameters and proceeds through epochs, employing early stopping criteria based on performance improvement, uncertainty thresholds derived from dropout simulations, and calibration quality measured by metrics like Expected Calibration Error (ECE). An active learning phase strategically selects high-value samples to optimize training efficiency. Training terminates when performance plateaus, as determined by a dynamic stopping criterion. The resulting trained DBN model is then saved for subsequent ransomware detection tasks, striving for a robust and accurate model capable of consistently identifying ransomware attacks.
Algorithm 2. UA-DES and DBN Integration Pseudocode [70].
Initialize DBN model
Initialize training parameters (epochs, learning rate, etc.)
Initialize early stopping params (thrshld for perf improve, uncertainty thrshld, calibr qual. thrshld)
1.For each epoch in training:
2.Train DBN on training dataset
3.Evaluate DBN on validation dataset
4.Calculate performance metric (e.g., accuracy, F1-score)
5.#   Dropout as Bayesian approximation for uncertainty estimation
6.Perform dropout simulations on validation dataset
7.   Calculate mean and standard deviation of performance metric across simulations
8.#   Calibration of probability estimates
9.Calibrate model outputs on validation dataset
10.   Calculate calibration quality (e.g., Expected Calibration Error)
11.# Active learning for data efficiency
12.If epoch % active_learning_interval == 0:
13.   Identify and prioritize uncertain samples in training dataset
14.   Retrain DBN model including prioritized samples
15.#   Dynamic stopping criterion VALIDATION based on perf improvement, uncertainty, and calibration
16.If (performance improvement < performance improvement threshold) And
17.   (standard deviation of performance metric < uncertainty threshold) And
18.    (calibration quality > calibration quality threshold) Then
19.   Stop the training

4.4.2. Improved Detection Capability

The UA-DES mechanism refines DBN training for ransomware detection, enhancing precision and reliability. The process involves initializing the DBN with specific parameters and setting early stopping criteria based on performance, uncertainty, and calibration quality, with epoch-based training and validation set evaluation guiding stopping decisions. UA-DES incorporates uncertainty estimation via dropout simulations and calibrates predictions to ensure reliability. Active learning prioritizes informative samples, promoting training efficiency, while a dynamic stopping criterion mitigates overfitting, resulting in a robust DBN model.
For UA-DES-DBN model validation, we assembled a comprehensive dataset comprising 8152 crypto-ransomware samples from virusshare.com, representing diverse families like Cerber, TeslaCrypt, CryptoWall, Petya, and WannaCry, alongside 1000 benign programs from informer.com. Both ransomware and benign samples underwent analysis in a sandbox environment. Python libraries, including Sklearn, Pandas, NumPy, and SkFeature, facilitated data analysis and evaluation.
The API call features used as model input, a sample of which is shown in Table 7, are highly indicative of ransomware behavior. Notably, cryptographic APIs like CryptEncrypt and CryptGenKey play a crucial role in file encryption. File access APIs such as CreateFile and DeleteFile indicate unauthorized file manipulation. Network APIs like WinHttpConnect and WinHttpOpenRequest suggest potential data exfiltration or command-and-control communication. These features collectively provide a robust foundation for the model’s detection capabilities.

4.4.3. Overall Results and Discussion

Figure 16 presents a comparative analysis of accuracy across varying input layer sizes, highlighting the superior performance of the UA-DES-DBN model compared to VGG16-PSO [90], DBN-IDS [91], and DBN [92]. Notably, UA-DES-DBN demonstrates a significant improvement in accuracy as the input size increases from 5 to 20, peaking at 0.986. While a slight decline is observed at larger input sizes, the model maintains robust performance. In contrast, CNN-MD exhibits lower accuracy rates, and DBN-IDS and DBN models show greater variability. At an input size of 25, UA-DES-DBN achieves 0.982, consistently outperforming the other models.
These results underscore the effectiveness of the UA-DES-DBN model, particularly in mid-range input sizes. The model’s ability to maintain high accuracy, even with slight fluctuations, demonstrates its resilience and adaptability to complex data patterns. The integration of uncertainty estimation and dynamic stopping criteria effectively mitigates overfitting, contributing to the model’s robust performance. This validation confirms the UA-DES-DBN model’s potential for reliable and accurate ransomware detection in real-world scenarios.
Despite the strong performance of UA-DES-DBN, the difference from other models is sometimes narrow. Advanced ransomware evasion techniques like polymorphic and metamorphic behaviors cover malicious intent that make early detection harder. The model focuses on the pre-encryption phase, where attack patterns are scarce and less distinct. Even slight accuracy improvements in this stage are significant because they enhance the proactive mitigation of ransomware attacks before encryption occurs. The ability to identify small anomalies early provides an advantage in cybersecurity defense.
As Figure 17 shows, UA-DES-DBN exhibits lower false positive rates (FPRs) than CNN-MD, DBN-IDS, and standard DBN models across varying input layer sizes (20–50). Notably, at an input size of 25, UA-DES-DBN achieves an FPR of 0.104, demonstrating superior performance in complex data processing. This reduction in FPR, particularly at larger input sizes, is attributed to UA-DES’s dynamic training adjustments based on uncertainty, effectively preventing overfitting and refining decision thresholds.
Figure 18 illustrates UA-DES-DBN’s consistently high DR across various input sizes, which often surpasses or closely matches other models. At an input size of 25, it achieves a DR of 0.956, emphasizing its ability to accurately identify ransomware. The UA-DES mechanism enhances detection by adjusting training based on uncertainty. This ensures a perfect balance between underfitting and overfitting. Moreover, its ability to leverage larger input sizes for improved detection is particularly useful for evolving ransomware threats.
The F-score comparison in Figure 19 further validates UA-DES-DBN’s effectiveness in balancing precision and recall for ransomware detection. At an input size of 30, it achieves an F-score of 0.962 that outperforms other models. The UA-DES mechanism’s dynamic training adjustments prevent overfitting and improve generalization. So, it ensures consistently high F-scores across different input sizes. These findings prove the importance of advanced early stopping mechanisms in developing robust and precise cybersecurity models.
Figure 20 presents the false negative rate (FNR) comparison, where UA-DES-DBN consistently shows lower FNRs and a notable reduction at an input size of 25. While the model performs well across different input sizes, slight changes suggest sensitivity to feature dimensionality. The rise in the FNR at specific feature sizes indicates potential overfitting that needs further investigation.
The UA-DES-DBN model, which significantly improves DBN training for ransomware detection by enhancing both precision and reliability, demonstrates strong specificity. As shown in Figure 21, it generally outperforms or matches competing models, achieving a peak specificity of 0.896 at an input size of 25. This ability to accurately distinguish ransomware from benign activities, thereby reducing false positives, is crucial in cybersecurity applications. The UA-DES mechanism initializes the DBN with optimized parameters and employs dynamic early stopping based on performance, uncertainty, and calibration quality, with uncertainty estimated via dropout simulations and predictions calibrated for enhanced reliability. Active learning prioritizes informative samples, maximizing training efficiency, while the dynamic stopping criterion effectively mitigates overfitting. While specificity remains strong, minor variations beyond size 25 suggest potential overfitting, highlighting areas for further model improvement. Table 8 gives an overall summary of the experimental results.
Despite the widespread adoption of DBNs and other deep learning algorithms for ransomware detection, certain limitations warrant further investigation. A primary area for future research is model interpretability. Enhancing interpretability would enable researchers to better pinpoint detection failures and identify critical model components for targeted improvement. Table 9 provides a concise summary of the motivations, framework components, and corresponding limitations of this research.

5. Conclusions

This work explores early and accurate ransomware detection, which is crucial for mitigating its impact on individuals and organizations. Traditional detection methods often fail due to attackers’ avoidance techniques and high false positive rates. To address these challenges, this framework uses a three-phase methodology: data augmentation, feature selection, and model training and validation.
During the first phase, the framework develops a dynamic ransomware early detection model capable of predicting behavioral changes. By using GANs, the GBM-GAN model generates realistic attack patterns that address the lack of diverse ransomware data and enhance the capabilities of detection. Also, by leveraging the adversarial nature of GANs, the model adapts to polymorphic and metamorphic ransomware features, which improve early detection. The experimental results show a peak detection accuracy of 98%, a recall rate of 96%, and a false positive rate of 14%. This framework supports cybersecurity by predicting ransomware threats and mitigating them before causing damage.
During the second phase, the framework employs incremental learning to update relevant features as new data arrives dynamically. To address ransomware’s evolving nature, this work introduces the IMIS technique, which selects non-duplicative features early in an attack. This reduces computational load and improves adaptability. The results show that the IMIS-DBN model surpasses traditional methods by achieving 97.9% accuracy with 25 features and a low false positive rate of 0.104. Therefore, this highlights the importance of adaptive feature selection in ransomware detection. Future research will explore IMIS’s application in real-time and wider malware detection.
During the third phase, the proposed model employs a dynamic training regimen to mitigate overfitting and underfitting, thereby enhancing detection accuracy and reducing false positives. This phase introduces a UA-DES technique, which leverages uncertainty estimation and dropout simulations to optimize training. By integrating uncertainty and calibration quality metrics, UA-DES ensures heightened accuracy and reliability in ransomware detection.
Empirical results demonstrate that, altogether, the UA-DES-DBN model achieves a 98.6% accuracy, surpassing traditional models. Consequently, this research advances DBN-based detection, and future work will explore alternative deep learning architectures and refine uncertainty calibration to address evolving threat landscapes. While the proposed framework demonstrates strong performance, several limitations should be acknowledged. First, the dataset is limited to portable executable files on Windows, potentially affecting generalizability to other platforms such as Linux or MacOS. Second, although the GAN enhances data diversity, its output quality still depends on the initial sample distribution, which could limit detection capability in unseen ransomware variants. Third, while IMIS enables real-time feature adaptation, it may struggle in the presence of persistent noisy or redundant features. Lastly, the DBN model requires extensive training resources and tuning, which could challenge deployment in resource-constrained environments (e.g., IoT devices).

6. Future Research

Future research will focus on enhancing this framework to bolster ransomware detection efficacy and operational efficiency. Three key areas demand rigorous attention: (i) mitigating the risk of misleading samples generated by GANs, (ii) developing adaptive strategies for diverse attack behaviors in real-time, and (iii) optimizing the computational efficiency of DBNs for dynamic threat environments. The subsequent subsections explore these critical areas, outlining challenges and potential solutions.

6.1. Risk of Generating Misleading Samples

Using GANs for ransomware detection can accidentally create adversarial examples that mislead the model. While simulating real ransomware, these unreal patterns may introduce false positives or negatives, which reduce detection reliability. Since ransomware develops continuously, GAN-generated data that is incorrectly managed can lead to not fitting the model with real-world threats. Careful supervision is essential to ensure that augmented datasets accurately reflect diverse and complex ransomware behaviors that preserve detection effectiveness.

6.2. Empirical Diversity of Attack Behavior

Incremental feature selection presents challenges in real-time data processing. Unlike offline training, where preprocessing tasks like normalization and feature extraction are manageable, online approaches must handle continuous data streams efficiently. This requires rapid integration while minimizing computational overhead. The flow of new data may present noise or irrelevant features, which complicate the learning process. Also, effective strategies are needed to maintain model accuracy and adaptability without consuming too many resources.

6.3. Computational Efficiency

DBNs excel in complex feature learning, but they demand significant computational resources for both training and retraining. While continuous learning is vital for adapting to new ransomware threats, the high processing costs and slow inference times pose challenges for real-time detection. These inefficiencies may delay responses to emerging threats, leaving systems vulnerable. Optimizing DBN training and inference speeds is critical for maintaining effective ransomware detection in dynamic threat environments.
The proposed framework offers a promising advancement for cybersecurity, particularly for vendors, threat intelligence platforms, and endpoint protection services aiming to enhance their early detection capabilities. Its modular design facilitates seamless integration into current sandbox environments and real-time monitoring systems. Unlike existing industry solutions that depend on static signatures or delayed anomaly detection, our approach provides proactive defense by capturing pre-encryption behaviors and adapting to evolving attack patterns. This makes our framework a complementary and forward-looking addition, significantly strengthening existing detection pipelines.

Author Contributions

Conceptualization, M.G. and F.T.S.; methodology, M.G. and B.A.; software, M.G.; validation, M.G. and F.T.S.; formal analysis, M.G. and F.T.S.; investigation, M.G.; resources, M.A. and B.A.; data curation, M.G. and M.A.; writing—original draft preparation, M.G.; writing—review and editing, M.A., B.A. and F.T.S.; visualization, M.G.; supervision, F.T.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

All ransomware portable executable (PE) files are publicly available.

Acknowledgments

The authors are thankful to the Deanship of Graduate Studies and Scientific Research at Najran University for funding this work.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following acronyms are provided as a courtesy to the reader and are taken from this manuscript.
AAA-ODBNArtificial Algae Optimization Algorithm with Optimal Deep Belief Network
APIApplication Programming Interface
AVAnti-Virus
C2Command and Control
CISACybersecurity and Infrastructure Security Agency
CNNConvolutional Neural Network
DBNDeep Belief Network
DNNDeep Neural Network
DoRDenial-of-Resources
DPBD-FEDynamic Pre-encryption Boundary Delineation and Feature Extraction
DRDetection Rates
ECEExpected Calibration Error
FNRFalse Negative Rate
FPRFalse Positive Rate
GANGenerative Adversarial Network
HMIHuman–Machine Interface
IC3FBI’s Internet Crime Complaint Center
ICSIndustrial Control System
IDPSIntrusion Detection and Prevention System
IDSIntrusion Detection System
IMIIncremental Mutual Information
FWFirewall
IMISIncremental Mutual Information Selection
IOCIndicator of Compromise
IoMTInternet of Medical Things
IoTInternet of Things
LSTMLong Short-Term Memory
MalwareMalicious Software
MIFSMutual Information Feature Selection
NISTNational Institute of Standards & Technology
NLLNegative Log-Likelihood
OTOperational Technology
PEPortable Executable
PRDLPolymorphic Ransomware Deep Learning
RaaSRansomware-as-a-Service
RBMRestricted Boltzmann Machine
ReLURectified Linear Unit
SCADASupervisory Control and Data Acquisition
SVMSupport Vector Machine
TSTemperature Scaling
TTPTactics, Techniques, and Procedures
UA-DESUncertainty-Aware Dynamic Early Stopping
VMIVirtual Machine Introspection
PLCProgrammable Logic Controller

Appendix A. Case Studies

This appendix is an extension of Section 2.1, Ransomware Attacks and Trends. The purpose is to summarize and characterize the seminal ransomware incidents that have had devastating consequences in terms of critical infrastructure, resources, operations, and impact.

High-Impact Ransomware Attacks on Critical Infrastructure

The May 2021 ransomware attack on JBS S.A., the world’s largest meat processing company, exemplifies the severe disruption such attacks can inflict on critical industries. Attributed to the REvil ransomware group, the attack forced the temporary closure of JBS facilities in the United States, Australia, and Canada, threatening global meat supply chains and raising concerns about price increases. JBS paid a USD 11 million ransom in Bitcoin to restore operations. This incident highlighted the vulnerability of highly consolidated food industries and underscored the growing threat of ransomware to essential sectors.
Also in May 2021, the Colonial Pipeline ransomware attack demonstrated the devastating impact on energy infrastructure. Carried out by the DarkSide group, the attack compelled the shutdown of the pipeline, which supplies nearly half of the East Coast’s fuel. This resulted in fuel shortages, panic buying, and price surges, causing significant disruption to transportation and the economy. Colonial Pipeline paid a USD 4.4 million ransom (partially recovered by the FBI). The attack triggered a federal response, emphasizing the critical vulnerability of energy pipelines and the potential for widespread economic damage from cyberattacks.
While REvil and DarkSide executed the JBS and Colonial Pipeline attacks, the Ryuk ransomware group’s activities provide crucial context for understanding the broader threat landscape. Ryuk, associated with the Wizard Spider/Grim Spider group, specializes in targeted attacks against high-value organizations, often using TrickBot for initial network access. Its tactics, including lateral movement and sophisticated encryption, are common among ransomware groups, highlighting the shared vulnerabilities within critical infrastructure. Therefore, studying Ryuk’s methods is essential for developing effective defenses against similar high-impact attacks, even those carried out by other threat actors. The Ryuk group is also important to note when discussing attacks on large organizations, such as the attack on Change Healthcare.
Change Healthcare occupied a significant position within the U.S. healthcare sector, particularly in healthcare technology and business solutions. Operating at the critical intersection of healthcare providers, payers, and patients, it provided a wide array of services, including revenue cycle management, payment processing, and data analytics. This placed the company as a vital intermediary in the flow of healthcare information and financial transactions. Its systems handled massive volumes of sensitive patient data and financial transactions, making it a crucial component of U.S. healthcare infrastructure, with its services being used by a large number of hospitals, clinics, and insurance companies. It is important to note that Change Healthcare is now part of Optum, which is part of UnitedHealth Group, a move that has further solidified its position within the healthcare technology landscape. The recent cyberattacks on Change Healthcare have demonstrated just how vital a part of the healthcare infrastructure it was. Therefore, Change Healthcare’s sector position can be characterized as a critical infrastructure provider within the U.S. healthcare system, a dominant player in healthcare technology, particularly in revenue cycle management and data exchange, and a central hub for healthcare transactions and data, connecting various stakeholders. In essence, it was a linchpin in the operational and financial workings of the U.S. healthcare industry.
In summary, this section illustrates the escalating threat of ransomware attacks on critical infrastructure through several high-profile case studies. The JBS and Colonial Pipeline attacks in 2021 demonstrated the potential for such attacks to disrupt essential services, impacting food and fuel supplies, and causing widespread economic consequences. While different threat actors were involved in each case, the activities of groups like Ryuk highlight common tactics and the broad vulnerability of interconnected systems. Additionally, the significant role of Change Healthcare within the U.S. healthcare sector, particularly in healthcare technology, emphasizes the potential for cyberattacks to disrupt vital healthcare operations. These attacks alone cost tens of millions of dollars, with JBS paying USD 11 million and Colonial Pipeline paying USD 4.4 million. The global cost of ransomware over the last five years is estimated to be hundreds of billions of dollars. The top three geographic origins for ransomware payments are believed to be Russia, China, and Iran.

Appendix B. Code Samples

The following code samples include data augmentation using BBM-GAN, feature selection using IMISm, and UEA-DEA for early stopping.

Appendix B.1. Data Augmentation Using BBM-GAN

The following code snippet demonstrates the implementation of a BiGradualMinimaxGAN (BGM-GAN) technique for ransomware pre-encryption data augmentation. The experimental study utilized Python packages such as Sklearn, Pandas, Numpy, and SkFeature to analyze a dataset of 8152 crypto-ransomware samples from various families, including Cerber, TeslaCrypt, CryptoWall, Petya, and WannaCry. These samples were obtained from the public repository virusshare.com. Furthermore, 1000 harmless programs were retrieved from informer.com, a popular warehouse for Windows software. Both ransomware and benign samples were run in a sandbox environment for assessment.
The code begins with data preparation steps, where the ransomware dataset is loaded from a CSV file (ransomware_dataset.csv), with features (X) and target labels (y) extracted. The features are standardized using StandardScaler to ensure zero mean and unit variance. The dataset is then split into training and testing sets with a 70–30 ratio using train_test_split.
The BGM-GAN model is defined through the BiGradualMinimaxGAN class. The class initializes the input and latent dimensions and constructs the generator, discriminator, and combined GAN models. The build_generator method creates a sequential model with dense layers, transforming latent vectors into data points using ReLU and sigmoid activations. The build_discriminator method defines another sequential model that distinguishes between real and generated data, utilizing ReLU and sigmoid activations and compiling with binary cross-entropy loss and accuracy metrics. The build_gan method combines these models into a GAN, where the discriminator is set to non-trainable to focus the training on the generator’s performance. This implementation aids in generating synthetic data to augment the original dataset, enhancing the model’s capability to effectively detect ransomware.
Futureinternet 17 00311 i001

Appendix B.2. Code Sample for Feature Selection Using IMIS

The following code snippet demonstrates the implementation of feature selection using Incremental Mutual Information Selection (IMIS) on an augmented ransomware dataset. The code begins with data preparation steps, where the augmented ransomware dataset is loaded from a CSV file (Augmented_ransomware_dataset.csv), with features (X) and target labels (y) extracted. The features are standardized using StandardScaler to ensure zero mean and unit variance. The dataset is then split into training and testing sets with a 70–30 ratio using train_test_split.
The IMIS model is defined through the IncrementalMutualInformationSelection class. This class is designed to incrementally select the most relevant features based on mutual information. It initializes with parameters for alpha and threshold, setting up attributes to store historical mutual information and selected features. The fit method processes batches of features and target labels, calculating the mutual information for each batch using the calculate_mutual_information method. It then updates the relevance of features based on the current mutual information and selects features using the select_and_update_features method. The selected features are yielded in each iteration, allowing for an incremental update of the feature set. An instance of the IMIS class is created with specific alpha and threshold values, enabling a dynamic and adaptive feature selection process. This framework helps in identifying the most relevant features incrementally, enhancing the model’s capability to effectively analyze and detect patterns in the ransomware dataset by continuously updating and refining the feature set based on the mutual information criterion.
Futureinternet 17 00311 i002

Appendix B.3. Code Sample of UEA-DES for Early Stopping

The following code snippet demonstrates the implementation of feature selection using UA-DES (Uncertainty-Aware Dynamic Early Stopping) for an augmented ransomware dataset. The code begins with data preparation steps, where the augmented ransomware dataset is loaded from a CSV file (Aug_ransomware_dataset_FS.csv), with features (X) and target labels (y) extracted. The features are standardized using StandardScaler to ensure zero mean and unit variance. The dataset is then split into training and testing sets with a 70–30 ratio using train_test_split. The UA-DES model is defined through the UADES class. The code proceeds to configure and train a Deep Belief Network (DBN) using a pipeline that includes a Bernoulli Restricted Boltzmann Machine (RBM) and logistic regression. The DBN is trained on the selected features from the training set and evaluated on the test set.
Futureinternet 17 00311 i003

Appendix C. Representative Data Samples

The following provides a snippet from the data used in this study. The following are screenshots of a part of the data. Each row represents a ransomware instance, while the columns represent the APIs called during the runtime of the ransomware. Those APIs reveal the activities that ransomware does when it runs on the victim’s system. Those activities are related to the interaction between the ransomware process and the file system, memory, network, encryption, and registry. The three screenshots collectively provide an extended view of API call data for a set of ransomware samples, covering the same ransomware instances across multiple columns. These images are intended to display a comprehensive range of API calls, highlighting the behavior and characteristics of each ransomware instance.
The dataset used in this study is designed to facilitate the early detection of ransomware through various machine learning techniques. The data was generated using Generative Adversarial Networks (GANs) to simulate realistic ransomware attack patterns, addressing the insufficiency of real-world attack data. The generator network of the GANs was trained to produce realistic attack data, while the discriminator network was trained to differentiate between real and synthetic data. The Incremental Mutual Information Selection (IMIS) technique was employed to dynamically select the most relevant features from the generated data. The IMIS algorithm continuously updated feature relevance as new data arrived, ensuring the model adapted to evolving ransomware characteristics. The final detection model was a DBN trained using the augmented dataset and selected features.
Ransomware often leverages certain APIs to perform cryptographic operations and interact with the file system. Here are some key APIs relevant to ransomware.
  • Cryptography APIs: These APIs are used to encrypt user files, rendering them inaccessible without the decryption key.
    CryptEncrypt/CryptDecrypt: Functions for encrypting and decrypting data using a specified algorithm and key.
    OpenSSL EVP_EncryptInit_ex/EVP_EncryptUpdate/EVP_EncryptFinal_ex: Functions for initializing, updating, and finalizing encryption operations.
  • File System APIs: These APIs are used to locate and access files for encryption, overwrite files with encrypted content, and sometimes delete original unencrypted files to prevent recovery.
    CreateFile/WriteFile/ReadFile: Functions for creating, writing to, and reading from files,
    FindFirstFile/FindNextFile: Functions for enumerating files in a directory,
    DeleteFile:Functionfordeletingfiles.
Futureinternet 17 00311 i004
The following table lists the top 10 API features identified by the IMIS feature selection technique developed in this study.
Table A1. Top 10 API features identified by the IMIS feature selection technique.
Table A1. Top 10 API features identified by the IMIS feature selection technique.
Feature Rank Feature Name Feature Type
1CryptEncrypt Crypto APIs
2CreateFile File access APIs
3CryptGenKey Crypto APIs
4WinHttpConnect Network APIs
5FindFirstFileEXAFile access APIs
6CryptDestroyKeyCrypto APIs
7WinHttpOpenRequestNetwork APIs
8FindNextFileAFile access APIs
9CryptGenRandomCrypto APIs
10DeleteFileFile access APIs

References

  1. Benmalek, M. Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges. Internet Things Cyber-Phys. Syst. 2024, 4, 186–202. [Google Scholar] [CrossRef]
  2. Cen, M.; Jiang, F.; Qin, X.; Jiang, Q.; Doss, R. Ransomware early detection: A survey. Comput. Netw. 2024, 239, 110138. [Google Scholar] [CrossRef]
  3. Roseline, S.A.; Geetha, S. A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks. Comput. Electr. Eng. 2021, 92, 107143. [Google Scholar] [CrossRef]
  4. Li, D.; Li, Q. Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3886–3900. [Google Scholar] [CrossRef]
  5. Al-Rimy, B.A.S.; Maarof, M.A.; Shaid, S.Z.M. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Comput. Secur. 2018, 74, 144–166. [Google Scholar] [CrossRef]
  6. Gulmez, S.; Kakisim, A.G.; Sogukpinar, I. XRan: Explainable deep learning-based ransomware detection using dynamic analysis. Comput. Secur. 2024, 139, 103703. [Google Scholar] [CrossRef]
  7. Oz, H.; Aris, A.; Levi, A.; Uluagac, A.S. A survey on ransomware: Evolution, taxonomy, and defense solutions. ACM Comput. Surv. (CSUR) 2022, 54, 1–37. [Google Scholar] [CrossRef]
  8. Beaman, C.; Barkworth, A.; Akande, T.D.; Hakak, S.; Khan, M.K. Ransomware: Recent advances, analysis, challenges and future research directions. Comput. Secur. 2021, 111, 102490. [Google Scholar] [CrossRef] [PubMed]
  9. Urooj, U.; Al-rimy, B.A.S.; Zainal, A.; Ghaleb, F.A.; Rassam, M.A. Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions. Appl. Sci. 2022, 12, 172. [Google Scholar] [CrossRef]
  10. Gazzan, M.; Sheldon, F.T. Opportunities for early detection and prediction of ransomware attacks against industrial control systems. Future Internet 2023, 15, 144. [Google Scholar] [CrossRef]
  11. Alqahtani, A.; Gazzan, M.; Sheldon, F.T. A proposed crypto-ransomware early detection (CRED) model using an integrated deep learning and vector space model approach. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 275–279. [Google Scholar]
  12. Urooj, U.; Maarof, M.A.B.; Al-rimy, B.A.S. A proposed adaptive pre-encryption crypto-ransomware early detection model. In Proceedings of the 2021 3rd International Cyber Resilience Conference (CRC), Langkawi Island, Malaysia, 29–31 January 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
  13. Al-Rimy, B.A.S.; Maarof, M.A.; Alazab, M.; Shaid, S.Z.M.; Ghaleb, F.A.; Almalawi, A.; Ali, A.M.; Al-Hadhrami, T. Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection. Future Gener. Comput. Syst. 2021, 115, 641–658. [Google Scholar] [CrossRef]
  14. Alqahtani, A.; Sheldon, F.T. A survey of crypto ransomware attack detection methodologies: An evolving outlook. Sensors 2022, 22, 1837. [Google Scholar] [CrossRef] [PubMed]
  15. Al-rimy, B.A.S.; Maarof, M.A.; Shaid, S.Z.M. Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. Future Gener. Comput. Syst. 2019, 101, 476–491. [Google Scholar] [CrossRef]
  16. Urooj, U.; Al-Rimy, B.A.S.; Zainal, A.B.; Saeed, F.; Abdelmaboud, A.; Nagmeldin, W. Addressing Behavioral Drift in Ransomware Early Detection Through Weighted Generative Adversarial Networks. IEEE Access 2023, 12, 3910–3925. [Google Scholar] [CrossRef]
  17. Alabdulwahab, S.; Kim, Y.-T.; Seo, A.; Son, Y. Generating Synthetic Dataset for ML-Based IDS Using CTGAN and Feature Selection to Protect Smart IoT Environments. Appl. Sci. 2023, 13, 10951. [Google Scholar] [CrossRef]
  18. Lall, S.; Ray, S.; Bandyopadhyay, S. Generating Realistic Cell Samples for Gene Selection in scRNA-seq Data: A Novel Generative Framework. bioRxiv 2021. [Google Scholar] [CrossRef]
  19. Liu, Q.; Liang, T.; Dinavahi, V. Deep Learning for Hardware-Based Real-Time Fault Detection and Localization of All Electric Ship MVDC Power System. IEEE Open J. Ind. Appl. 2020, 1, 194–204. [Google Scholar] [CrossRef]
  20. Wang, S.L.; Zhao, C.; Huang, L.; Li, Y.; Li, R. Current Status, Application, and Challenges of the Interpretability of Generative Adversarial Network Models. Comput. Intell. 2022, 39, 283–314. [Google Scholar] [CrossRef]
  21. Alalhareth, M.; Hong, S.-C. An Adaptive Intrusion Detection System in the Internet of Medical Things Using Fuzzy-Based Learning. Sensors 2023, 23, 9247. [Google Scholar] [CrossRef] [PubMed]
  22. Zhu, T.; Kuang, L.; Daniels, J.; Herrero, P.; Li, K.; Georgiou, P. IoMT-enabled real-time blood glucose prediction with deep learning and edge computing. IEEE Internet Things J. 2022, 10, 3706–3719. [Google Scholar] [CrossRef]
  23. Xue, L.; Sun, G. Design and implementation of a malware detection system based on network behavior. Secur. Commun. Netw. 2015, 8, 459–470. [Google Scholar] [CrossRef]
  24. Robinson, M. The SCADA threat landscape. In Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013), Leicester, UK, 16–17 September 2013; 2013; Volume 1, pp. 30–41. [Google Scholar]
  25. Hansen, S.S.; Larsen, T.M.T.; Stevanovic, M.; Pedersen, J.M. An approach for detection and family classification of malware based on behavioral analysis. In Proceedings of the 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, USA, 15–18 February 2016; pp. 1–5. [Google Scholar] [CrossRef]
  26. Milošević, N. History of malware. arXiv 2013, arXiv:1302.5392. [Google Scholar]
  27. Galal, H.S.; Mahdy, Y.B.; Atiea, M.A. Behavior-based features model for malware detection. J. Comput. Virol. Hacking Tech. 2016, 12, 59–67. [Google Scholar] [CrossRef]
  28. del Rey, A.M. Mathematical modeling of the propagation of malware: A review. Secur. Commun. Netw. 2015, 8, 2561–2579. [Google Scholar] [CrossRef]
  29. Song, S.; Kim, B.; Lee, S. The effective ransomware prevention technique using process monitoring on android platform. Mob. Inf. Syst. 2016, 2016, 2946735. [Google Scholar] [CrossRef]
  30. Mercaldo, F.; Nardone, V.; Santone, A.; Visaggio, C.A. Ransomware Steals Your Phone. Formal Methods Rescue It. In Formal Techniques for Distributed Objects, Components, and Systems: 36th IFIP WG 6.1 International Conference, FORTE 2016, Held as Part of the 11th International Federated Conference on Distributed Computing Techniques, DisCoTec 2016, Heraklion, Crete, Greece, 6–9 June 2016 Proceedings; Albert, E., Lanese, I., Eds.; Springer International Publishing: Cham, Switzerland, 2016; pp. 212–221. [Google Scholar]
  31. Yang, T.; Yang, Y.; Qian, K.; Lo, D.C.-T.; Qian, Y.; Tao, L. Automated Detection and Analysis for Android Ransomware. In Proceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, USA, 24–26 August 2015; pp. 1338–1343. [Google Scholar] [CrossRef]
  32. Andronio, N.; Zanero, S.; Maggi, F. HELDROID: Dissecting and detecting mobile ransomware. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2015, Kyoto, Japan, 2–4 November 2015; Volume 9404, pp. 382–404. [Google Scholar]
  33. Scaife, N.; Carter, H.; Traynor, P.; Butler, K.R. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. In Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), Nara, Japan, 27–30 June 2016. [Google Scholar]
  34. Kharraz, A.; Robertson, W.; Balzarotti, D.; Bilge, L.; Kirda, E. Cutting the gordian knot: A look under the hood of ransomware attacks. In Proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, Milano, Italy, 9–10 July 2015; Volume 9148, pp. 3–24. [Google Scholar]
  35. Cabaj, K.; Gawkowski, P.; Grochowski, K.; Kosik, A. Developing malware evaluation infrastructure. In Proceedings of the 2016 Federated Conference on Computer Science and Information Systems (FedCSIS), Gdańsk, Poland, 11–14 September 2016; pp. 981–989. [Google Scholar]
  36. Symantec. Ransomware and Businesses 2016. In An ISTR Special Report; Symantec Corporation: Tempe, AZ, USA, 2016. In An ISTR Special Report; Symantec Corporation: Tempe, AZ, USA, 2016. [Google Scholar]
  37. O’Gorman, G.; McDonald, G. Ransomware: A Growing Menace; Symantec Corporation: Tempe, AZ, USA, 2012. [Google Scholar]
  38. Savage, P.C.K.; Lau, H. The evolution of ransomware. In Security Response; Symantec Corporation: Tempe, AZ, USA, 2015. [Google Scholar]
  39. Bhardwaj, A.; Subrahmanyam, G.; Avasthi, V.; Sastry, H. Ransomware: A Rising Threat of new age Digital Extortion. arXiv 2015, arXiv:1512.01980. [Google Scholar]
  40. Young, A.L. Cryptoviral extortion using Microsoft’s Crypto API. Int. J. Inf. Secur. 2006, 5, 67–76. [Google Scholar] [CrossRef]
  41. Young, A.L. Building a Cryptovirus Using Microsoft’s Cryptographic API. In Proceedings of the Information Security: 8th International Conference, ISC 2005, Singapore, 20–23 September 2005; Zhou, J., Lopez, J., Deng, R.H., Bao, F., Eds.; Springer: Berlin/Heidelberg, Germany, 2005; pp. 389–401. [Google Scholar]
  42. Kumar, S.M.; Kumar, M.R. Cryptoviral Extortion: A virus based approach. Int. J. Comput. Trends Technol. (IJCTT) 2013, 4, 149–1153. [Google Scholar]
  43. Canham, M.; Posey, C.; Strickland, D.; Constantino, M.J. Phishing for Long Tails: Examining Organizational Repeat Clickers and Protective Stewards. Sage Open 2021, 11, 2158244021990656. [Google Scholar] [CrossRef]
  44. Salahdine, F.; Kaabouch, N. Social engineering attacks: A survey. Future Internet 2019, 11, 89. [Google Scholar] [CrossRef]
  45. Luo, X.; Liao, Q. Awareness education as the key to ransomware prevention. Inf. Syst. Secur. 2007, 16, 195–202. [Google Scholar] [CrossRef]
  46. Zhang-Kennedy, L.; Assal, H.; Rocheleau, J.; Mohamed, R.; Baig, K.; Chiasson, S. The aftermath of a crypto-ransomware attack at a large academic institution. In Proceedings of the 27th {USENIX} Security Symposium ({USENIX} Security 18), Baltimore, MD, USA, 15–17 August 2018; pp. 1061–1078. [Google Scholar]
  47. de Leon, D.C.; Bhandari, V.A.; Jillepalli, A.; Sheldon, F.T. Using a knowledge-based security orchestration tool to reduce the risk of browser compromise. In Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, 6–9 December 2016; IEEE: Piscataway, NJ, USA; pp. 1–8. [Google Scholar]
  48. Upadhyay, D.; Sampalli, S. SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations. Comput. Secur. 2020, 89, 101666. [Google Scholar] [CrossRef]
  49. Ahmed, Y.A.; Koçer, B.; Huda, S.; Al-rimy, B.A.S.; Hassan, M.M. A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection. J. Netw. Comput. Appl. 2020, 167, 102753. [Google Scholar] [CrossRef]
  50. Fovino, I.N.; Carcano, A.; Masera, M.; Trombetta, A. An experimental investigation of malware attacks on SCADA systems. Int. J. Crit. Infrastruct. Prot. 2009, 2, 139–145. [Google Scholar] [CrossRef]
  51. Ashrafuzzaman, M.; Das, S.; Chakhchoukh, Y.M.; Shiva, S.; Sheldon, F.T. Detection of Stealthy False Data Injection Attacks in Smart Grid using Ensemble-based Machine Learning. Comput. Secur. 2020, 97, 101994. [Google Scholar] [CrossRef]
  52. Zimba, A.; Wang, Z.; Chen, H. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems. ICT Express 2018, 4, 14–18. [Google Scholar] [CrossRef]
  53. Al-rimy, B.A.S.; Maarof, M.A.; Shaid, S.Z.M. A 0-day aware crypto-ransomware early behavioral detection framework. In Proceedings of the International Conference of Reliable Information and Communication Technology, Johor, Malaysia, 23–24 April 2017; Springer: Berlin/Heidelberg, Germany; pp. 758–766. [Google Scholar]
  54. Van Nhuong, N.; Nhi, V.T.Y.; Cam, N.T.; Phu, M.X.; Tan, C.D. SSSM-semantic set and string matching based malware detection. In Proceedings of the 7th IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2014, a Noi, Vietnam, 14–17 December 2015; Institute of Electrical and Electronics Engineers Inc.: Piscataway Township, NJ, USA, 2015. [Google Scholar] [CrossRef]
  55. Poonia, A.S.; Singh, S. Malware detection by token counting. In Proceedings of the 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014, Mysore, India, 27–29 November 2014; Institute of Electrical and Electronics Engineers Inc.: Piscataway Township, NJ, USA, 2015; pp. 1285–1288. [Google Scholar] [CrossRef]
  56. Kumar, C.U.O.; Kishore, S.; Geetha, A. Debugging using MD5 process firewall. In Proceedings of the 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014, Mysore, India, 27–29 November 2014; Institute of Electrical and Electronics Engineers Inc.: Piscataway Township, NJ, USA, 2015; pp. 1279–1284. [Google Scholar] [CrossRef]
  57. Prelipcean, D.B.; Popescu, A.S.; Gavrilut, D.T. Improving Malware Detection Response Time with Behavior-Based Statistical Analysis Techniques. In Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2015, Timisoara, Romania, 21–24 September 2015; Volume 2016, pp. 232–239. [Google Scholar] [CrossRef]
  58. Bridges, L. The changing face of malware. Netw. Secur. 2008, 2008, 17–20. (In English) [Google Scholar] [CrossRef]
  59. Pluskal, O. Behavioural malware detection using efficient SVM implementation. In Research in Adaptive and Convergent Systems, RACS 2015; Association for Computing Machinery, Inc.: New York, NY, USA, 2015; pp. 296–301. [Google Scholar] [CrossRef]
  60. Jillepalli, A.A.; Sheldon, F.T.; de Leon, D.C.; Haney, M.; Abercrombie, R.K. Security management of cyber physical control systems using NIST SP 800-82r2. In Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain; 26–30 June 2017; IEEE: Piscataway, NJ, USA; pp. 1864–1870.
  61. Le Guernic, C.; Legay, A. Ransomware and the Legacy Crypto API. In Risks and Security of Internet and Systems, Proceedings of the 11th International Conference, CRiSIS 2016, Roscoff, France, 5–7 September 2016, Revised Selected Papers; Springer: Berlin/Heidelberg, Germany, 2017; Volume 10158, p. 11. [Google Scholar]
  62. Christensen, J.B.; Beuschau, N. Ransomware Detection and Mitigation Tool. Master’s Thesis, Technical University of Denmark, Lyngby, Denmark, 2017. [Google Scholar]
  63. Chen, Z.-G.; Kang, H.-S.; Yin, S.-N.; Kim, S.-R. Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph. In Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Krakow, Poland, 6–10 August 2017. [Google Scholar]
  64. Sgandurra, D.; Muñoz-González, L.; Mohsen, R.; Lupu, E.C. Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection. arXiv 2016, arXiv:1609.03020. [Google Scholar]
  65. Ioanid, A.; Scarlat, C.; Militaru, G. The Effect of Cybercrime on Romanian SMEs in the Context of Wannacry Ransomware Attacks. In Proceedings of the 12th European Conference on Innovation and Entrepreneurship ECIE 2017, Paris, France, 21–22 September 2017; p. 307. [Google Scholar]
  66. Pandey, S.K.; Mehtre, B.M. Performance of malware detection tools: A comparison. In Proceedings of the 2014 IEEE International Conference on Advanced Communication, Control and Computing Technologies, ICACCCT 2014, Online, 8–10 May 2015; Institute of Electrical and Electronics Engineers Inc.: Piscataway Township, NJ, USA; pp. 1811–1817. [Google Scholar] [CrossRef]
  67. Zhang, X.; Wang, J.; Zhu, S. Dual Generative Adversarial Networks Based Unknown Encryption Ransomware Attack Detection. IEEE Access 2022, 10, 900–913. [Google Scholar] [CrossRef]
  68. Yadav, P.; Menon, N.; Ravi, V.; Vishvanathan, S.; Pham, T.D. EfficientNet convolutional neural networks-based Android malware detection. Comput. Secur. 2022, 115, 102622. [Google Scholar] [CrossRef]
  69. Su, X.; Shi, W.; Qu, X.; Zheng, Y.; Liu, X. DroidDeep: Using Deep Belief Network to characterize and detect android malware. Soft Comput. 2020, 24, 6017–6030. [Google Scholar] [CrossRef]
  70. Gazzan, M.; Sheldon, F.T. Novel Ransomware Detection Exploiting Uncertainty and Calibration Quality Measures Using Deep Learning. Information 2024, 15, 262. [Google Scholar] [CrossRef]
  71. Gavel, S.; Raghuvanshi, A.S.; Tiwari, S. Maximum correlation based mutual information scheme for intrusion detection in the data networks. Expert Syst. Appl. 2022, 189, 116089. [Google Scholar] [CrossRef]
  72. Gazzan, M.; Sheldon, F.T. An Incremental Mutual Information-Selection Technique for Early Ransomware Detection. Information 2024, 15, 262. [Google Scholar] [CrossRef]
  73. Zakaria, W.Z.A.; Alta, N.M.K.M.; Abdollah, M.F.; Abdollah, O.; Yassin, S.W.M.S. Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning. J. Adv. Res. Appl. Sci. Eng. Technol. 2024, 39, 110–131. [Google Scholar] [CrossRef]
  74. Alqahtani, A.; Sheldon, F.T. e MIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance. Sensors 2024, 24, 1728. [Google Scholar] [CrossRef] [PubMed]
  75. Bold, R.; Al-Khateeb, H.; Ersotelos, N. Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning Algorithms. Appl. Sci. 2022, 12, 12941. [Google Scholar] [CrossRef]
  76. Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.; Du, X.; Ali, I.; Guizani, M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Commun. Surv. Tutor. 2020, 22, 1646–1685. [Google Scholar] [CrossRef]
  77. Liu, Y.; Tantithamthavorn, C.; Li, L.; Liu, Y. Deep Learning for Android Malware Defenses: A Systematic Literature Review. ACM Comput. Surv. 2022, 55, 1–36. [Google Scholar] [CrossRef]
  78. Uysal, D.T.; Yoo, P.D.; Taha, K. Data-Driven Malware Detection for 6G Networks: A Survey From the Perspective of Continuous Learning and Explainability via Visualisation. IEEE Open J. Veh. Technol. 2023, 4, 61–71. [Google Scholar] [CrossRef]
  79. Shemitha, P.A.; Dhas, J.P.M. Crow Search With Adaptive Awareness Probability-Based Deep Belief Network for Detecting Ransomware. Int. J. Pattern Recognit. Artif. Intell. 2022, 36, 2251010. [Google Scholar] [CrossRef]
  80. Lansky, J.; Ali, S.; Mohammadi, M.; Majeed, M.K.; Karim, S.H.T.; Rashidi, S.; Hosseinzadeh, M.; Rahmani, A.M. Deep Learning-Based Intrusion Detection Systems: A Systematic Review. IEEE Access 2021, 9, 101574–101599. [Google Scholar] [CrossRef]
  81. Radoglou-Grammatikis, P.; Sarigiannidis, P.; Diamantoulakis, P.; Lagkas, T.; Saoulidis, T.; Fountoukidis, E.; Karagiannidis, G. Strategic Honeypot Deployment in Ultra-Dense Beyond 5G Networks: A Reinforcement Learning Approach. IEEE Trans. Emerg. Top. Comput. 2024, 12, 643–655. [Google Scholar] [CrossRef]
  82. Banaamah, A.M.; Ahmad, I. Intrusion Detection in IoT Using Deep Learning. Sensors 2022, 21, 8417. [Google Scholar] [CrossRef] [PubMed]
  83. Cao, F. Intrusion Anomaly Detection Based on Pseudo-Count Exploration. Available online: https://www.researchgate.net/publication/372378041_Intrusion_Anomaly_Detection_Based_on_Pseudo-Count_Exploration (accessed on 10 July 2025).
  84. Ferrag, M.A.; Janicke, H.; Smith, R. Deep Learning Techniques for Cyber Security Intrusion Detection: A Detailed Analysis. In Proceedings of the 6th International Symposium for ICS & SCADA Cyber Security Research 2019, Athens, Greece, 9–12 September 2019. [Google Scholar] [CrossRef]
  85. Cho, H.; Kim, Y.-J.; Lee, E.; Choi, D.; Lee, Y.J.; Rhee, W. Basic Enhancement Strategies When Using Bayesian Optimization for Hyperparameter Tuning of Deep Neural Networks. IEEE Access 2020, 8, 52588–52608. [Google Scholar] [CrossRef]
  86. Dorka, N.; Boedecker, J.; Burgard, W. Adaptively Calibrated Critic Estimates for Deep Reinforcement Learning. IEEE Robot. Autom. Lett. 2023, 8, 624–631. [Google Scholar] [CrossRef]
  87. Rezaeezade, A.; Batina, L. Regularizers to the Rescue: Fighting Overfitting in DeepLearning-based Side-Channel Analysis. J. Cryptogr. Eng. 2022, 14, 609–629. [Google Scholar] [CrossRef]
  88. Choi, H.; Lee, H. Exploiting All Samples in Low-Resource Sentence Classification: Early Stopping and Initialization Parameters. J. Cryptogr. Eng. 2021, 14, 609–629. [Google Scholar] [CrossRef]
  89. Wang, H.; Li, T.H.; Zhang, Z.; Chen, T.; Liang, H.; Sun, J. Early Stopping for Deep Image Prior. arXiv 2021, arXiv:2112.06074. [Google Scholar]
  90. El-Ghamry, A.; Darwish, A.; Hassanien, A.E. An optimized CNN-based intrusion detection system for reducing risks in smart farming. Internet Things 2023, 22, 100709. [Google Scholar] [CrossRef]
  91. Jothi, B.; Pushpalatha, M. WILS-TRS—A novel optimized deep learning based intrusion detection framework for IoT networks. Pers. Ubiquitous Comput. 2023, 27, 1285–1301. [Google Scholar] [CrossRef]
  92. Sharma, A.; Gupta, B.B.; Singh, A.K.; Saraswat, V. A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network. Int. J. Inf. Secur. 2023, 22, 119–135. [Google Scholar] [CrossRef]
Figure 1. Generalized view: classic internet-bridged Supervisory Control and Data Acquisition (SCADA) architecture.
Figure 1. Generalized view: classic internet-bridged Supervisory Control and Data Acquisition (SCADA) architecture.
Futureinternet 17 00311 g001
Figure 2. Ransomware detection architecture: Phase 1, Phase 2, and Phase 3.
Figure 2. Ransomware detection architecture: Phase 1, Phase 2, and Phase 3.
Futureinternet 17 00311 g002
Figure 3. Schematic of the essential Generative Adversarial Network (GAN) architecture.
Figure 3. Schematic of the essential Generative Adversarial Network (GAN) architecture.
Futureinternet 17 00311 g003
Figure 4. Accuracy results comparing BGM-GAN (proposed), standard GAN, CNN, and DBN models as a function of feature count, with each model trained for 30 epochs.
Figure 4. Accuracy results comparing BGM-GAN (proposed), standard GAN, CNN, and DBN models as a function of feature count, with each model trained for 30 epochs.
Futureinternet 17 00311 g004
Figure 5. Accuracy results comparing BGM-GAN (proposed), standard GAN, CNN, and DBN models as a function of feature count, with each model trained for 90 epochs.
Figure 5. Accuracy results comparing BGM-GAN (proposed), standard GAN, CNN, and DBN models as a function of feature count, with each model trained for 90 epochs.
Futureinternet 17 00311 g005
Figure 6. Accuracy results comparing BGM-GAN (proposed), standard GAN, CNN, and DBN models as a function of feature count, with each model trained for 150 epochs.
Figure 6. Accuracy results comparing BGM-GAN (proposed), standard GAN, CNN, and DBN models as a function of feature count, with each model trained for 150 epochs.
Futureinternet 17 00311 g006
Figure 7. Accuracy results comparing BGM-GAN (proposed), standard GAN, CNN, and DBN models as a function of feature count, with each model trained for 210 epochs.
Figure 7. Accuracy results comparing BGM-GAN (proposed), standard GAN, CNN, and DBN models as a function of feature count, with each model trained for 210 epochs.
Futureinternet 17 00311 g007
Figure 8. Comparative analysis of the averaged recall (true positive rate [TPR] or sensitivity) for BGM-GAN (proposed), standard GAN, CNN, and DBN models across different training epochs.
Figure 8. Comparative analysis of the averaged recall (true positive rate [TPR] or sensitivity) for BGM-GAN (proposed), standard GAN, CNN, and DBN models across different training epochs.
Futureinternet 17 00311 g008
Figure 9. Average false positive rate (FPR) comparison across training epochs for BGM-GAN, standard GAN, CNN, and DBN models.
Figure 9. Average false positive rate (FPR) comparison across training epochs for BGM-GAN, standard GAN, CNN, and DBN models.
Futureinternet 17 00311 g009
Figure 10. Data flow and component architecture of the IMIS-DBN ransomware detection system.
Figure 10. Data flow and component architecture of the IMIS-DBN ransomware detection system.
Futureinternet 17 00311 g010
Figure 11. Accuracy of IMIS vs. RCGU, EMRMR, MIFS, and JMI across 5 to 50 features [72].
Figure 11. Accuracy of IMIS vs. RCGU, EMRMR, MIFS, and JMI across 5 to 50 features [72].
Futureinternet 17 00311 g011
Figure 12. FPR of IMIS vs. RCGU, EMRMR, MIFS, and JMI across 5 to 50 features to evaluate the effectiveness in reducing false alarms [72].
Figure 12. FPR of IMIS vs. RCGU, EMRMR, MIFS, and JMI across 5 to 50 features to evaluate the effectiveness in reducing false alarms [72].
Futureinternet 17 00311 g012
Figure 13. DR of IMIS vs. RCGU, EMRMR, MIFS, and JMI across 5 to 50 features to evaluate its effectiveness in identifying threats [72].
Figure 13. DR of IMIS vs. RCGU, EMRMR, MIFS, and JMI across 5 to 50 features to evaluate its effectiveness in identifying threats [72].
Futureinternet 17 00311 g013
Figure 14. Classification performance (F1-score) comparison of IMIS, RCGU, EMRMR, and MIFS across feature set sizes (5–50).
Figure 14. Classification performance (F1-score) comparison of IMIS, RCGU, EMRMR, and MIFS across feature set sizes (5–50).
Futureinternet 17 00311 g014
Figure 15. Schematic representation and data flow for the UA-DES training architecture.
Figure 15. Schematic representation and data flow for the UA-DES training architecture.
Futureinternet 17 00311 g015
Figure 16. Accuracy comparison: UA-DES-DBN vs. existing methodologies [70].
Figure 16. Accuracy comparison: UA-DES-DBN vs. existing methodologies [70].
Futureinternet 17 00311 g016
Figure 17. FPR comparison: UA-DES-DBN vs. existing methodologies [70].
Figure 17. FPR comparison: UA-DES-DBN vs. existing methodologies [70].
Futureinternet 17 00311 g017
Figure 18. DR comparison: UA-DES-DBN vs. existing methodologies [70].
Figure 18. DR comparison: UA-DES-DBN vs. existing methodologies [70].
Futureinternet 17 00311 g018
Figure 19. F1-score comparison: UA-DES-DBN vs. existing methodologies [70].
Figure 19. F1-score comparison: UA-DES-DBN vs. existing methodologies [70].
Futureinternet 17 00311 g019
Figure 20. False negative rate (FNR comparison: UA-DES-DBN vs. existing methodologies [70].
Figure 20. False negative rate (FNR comparison: UA-DES-DBN vs. existing methodologies [70].
Futureinternet 17 00311 g020
Figure 21. Specificity comparison: UA-DES-DBN vs. existing methodologies [70].
Figure 21. Specificity comparison: UA-DES-DBN vs. existing methodologies [70].
Futureinternet 17 00311 g021
Table 1. Studies related to ransomware behavior prediction.
Table 1. Studies related to ransomware behavior prediction.
Author Problem Solution Method Tools Empirical Limitation
[33]The detection of ransomware based on past attack data is not suitable to detect novel, zero-day attacks, which are common nowadays. The behavioral patterns extracted from the dynamic analysis of ransomware during the execution time were used to train a prediction model. Support vector machines (SVM) were used to build the prediction model based on the behavioral data. ScikitLearn, and Pandas Yes This approach also uses historical behavior to predict future ones. This is not suitable for evasive ransomware that uses obfuscation and polymorphism to change its behavior from time to time.
[34]Advanced malware can obfuscate much of its traces through many mechanisms, such as metamorphic engines. Therefore, the detection of such malware has become a significant challenge for malware analysis mechanisms. A regression model to predict advanced malware based on a selected set of significant features extracted from a dataset of malware runtime data. The dataset is created by executing real-world malware samples and capturing the behavioral data into trace files. N/A Yes The model was trained using historical data of existing and known malware samples. The dataset does not contain the future behaviors necessary for accurate prediction models.
[35]Sophisticated Android malware families often implement techniques aimed at avoiding detection. Split-personality malware, for example, behaves benignly when it detects that it is running on an analysis environment such as a malware sandbox, and maliciously when running on a real user’s device. Exploiting sandbox detecting heuristic prediction to predict and automatically generate bytecode patches. An Andronew, a heuristic approach, was used based on API calls collected during the execution time of the malware. Sandbox Yes The heuristics were performed based on historical data, which limits the ability of this approach to predict the future behavior of malware
[41]Zero-day malware attacks are challenging due to the polymorphic nature of the malware. Generating synthesized malware samples based on existing malware signatures derived from the static analysis of malware payloads. GAN algorithm to generate artificial malware samples. Keras, and Tensorflow Yes The static analysis adopted by the study does not reveal the behavioral aspect of the malware as polymorphism works during the runtime. In addition, the packing and encryption techniques used by sophisticated malware prevent the static analysis from exploring the malware features.
[42]Existing malware detection is not accurate enough. A cluster-based detection engine that is trained based on artificial patterns represents the trending of malware behavior. GAN algorithm to create malware patterns. N/A N/A There was no evidence of the applicability and efficacy of the model.
[7]Malware authors have the ability to reveal the features used by detection models. MalGAN model that attacks black-box machine-learning detection models. A substitute detector to fit the black-box malware detection system. N/A Yes The data used for model training were general and limited to malware operational behavior. The context was not captured.
[43]The ransomware changes its behavior which makes it difficult to detect. The study studies data collected from the ransomware process and its interaction with the file system. It used malware development toolkits to create ransomware samples. ADMMutate, Clet, and Phatbot Yes The study is limited to the ability of the tools to manually create samples, which makes it impractical to have a diversified dataset.
[44]Detecting novel malware attacks is difficult as the behavior changes continuously. The model examines the patterns in the data and studies the evolution of the malware behavior. It used a collection of data from previous malware infections to train a logistic regression algorithm. N/A Yes Relying on the evolution of the attack behavior to forecast future attacks is not sufficient to visualize the sophisticated malware attacks.
[46]The new types of malware tend to be more difficult to detect than older ones. This has made content-based, signature-based, and pattern-matching techniques less effective in detecting and preventing ransomware attacks. Utilized the neural network algorithm to predict the future occurrences of ransomware and malware attacks over time. Time-series regression-based neural network algorithm model. TensorFlow, Keras, NumPy, Matplotlib, and Pandas Yes The model concentrates solely on data pertaining to processing operations, disregarding the context in which the process was executed.
[47]Existing ransomware attack predictions are not tailored for IoT systems that are diverse and resource-constrained environments. A technique for predicting ransomware using contextual data and utilizing a context ontology to gather information characteristics of ransomware attacks against the IoT. An ontology approach with SVM. N/A Yes Relying only on contextual data and ignoring the behavioral data is insufficient for modeling the characteristics of the evasive malware attacks.
[49]Detection solutions alone are no longer enough to protect against malware due to the increasing rate of zero-day attacks. An early prediction of malware attacks in Android devices was proposed. By capturing the implicit contextual relations between various data, the model predicts the suspicious behavior of a running process using data collected during the early stages of the attack within the same session. LSTM and ensemble learning. N/A Yes This approach is inadequate in terms of the necessary data required for an accurate prediction and is unable to anticipate the future behavior of the malware.
[49]Due to the obfuscation techniques employed by advanced malware, detection is no longer enough, and there is a need for methodologies to predict future behavior instead. A rapid sequence snapshot analysis was used to make the prediction decisions. A set of random snapshots were taken from the APIs and permission data and used to train an ensemble LSTM model that is used for the prediction. Tensorflow Yes The LSTM was trained on historical data only, which assumes that these historical attack patterns are likely to reoccur in future attacks. This does not hold, especially with the use of obfuscation and polymorphic strategies adopted by the malware to change the attack behavior.
[59]Existing approaches to detect the malware need to collect enough data which takes more time, during which the sabotage has likely already been inflicted by the time of detection. Predicting the behavior based on a short snapshot of behavioral data. An ensemble RNN. The method was able to predict the attack within 5 s with an accuracy of around 94%. Keras, and Tensorflow Yes The method relies on historical data to predict the behavior. This approach is not suitable for obfuscated behavior that tries to show a major difference between past and future attacks.
Table 2. The ransomware families in the dataset.
Table 2. The ransomware families in the dataset.
FamilySamplesFamilySamples
Cryptolocker741Cerber263
Cryptowall706Filecryptor772
Cryrar583Crypt789
Locky567CTB_Locker560
Petya593Satana289
Reventon617CryptXXX651
Teslactypt398Sage187
WannaCry436
Table 3. Performance analysis of the proposed Bi-Gradual Minimax GAN (BGM-GAN) across varying training epochs.
Table 3. Performance analysis of the proposed Bi-Gradual Minimax GAN (BGM-GAN) across varying training epochs.
EpochsE30E90E150E210
Features
50.8900.9340.9420.926
100.9080.9510.9540.957
150.8980.9370.9500.961
200.9150.9560.9560.962
250.9100.9410.9710.969
300.9270.9310.9800.967
350.9360.9380.9790.981
400.9370.9530.9760.986
450.9390.9460.9810.992
500.9380.9220.9840.995
Table 4. Training duration as a function of epoch count.
Table 4. Training duration as a function of epoch count.
Number of EpochsTraining Time (s)Number of EpochsTraining Time (s)
3070 s150307 s
90189 s210431 s
Table 5. A comparative performance evaluation of the proposed IMIS and related techniques.
Table 5. A comparative performance evaluation of the proposed IMIS and related techniques.
TechniquePer-Call Execution Time (s)Per-Call Execution Time (min)Train Time (min)
IMIS0.01 s3.5 m19 m
RCGU0.054 s10.8 m33 m
EMRMR0.063 s12.6 m37 m
MIFS0.03 s6.0 m28 m
JMI0.07 s4.0 m24 m
Table 6. The 10 most prevalent API calls utilized by ransomware, categorized by functionality.
Table 6. The 10 most prevalent API calls utilized by ransomware, categorized by functionality.
TypeFeaturesRank
Crypto APIsCryptEncrypt1
CryptGenKey3
CryptDestroyKey6
BCryptGenRandom9
File access APIsCreateFile2
FindFirstFileEXA5
FindNextFileA8
DeleteFile10
Network APIsWinHttpConnect4
WinHttpOpenRequest7
Table 7. Sample of API call features fed into the UA-DES-DBN model [70].
Table 7. Sample of API call features fed into the UA-DES-DBN model [70].
TypeFeatures
Crypto APIsCryptEncrypt|CryptGenKey|CryptDestroyKey|CryptGenRandom
File Access APIsCreateFile|FindFirstFileEXA|FindNextFileA|DeleteFile
Network APIsWinHttpConnect|WinHttpOpenRequest
Table 8. A summary of key experimental findings, detailing the models, metrics, and conclusions.
Table 8. A summary of key experimental findings, detailing the models, metrics, and conclusions.
Fig/TabPhaseComparison DetailsMetricsValue Proposition
Figure 4, Figure 5, Figure 6 and Figure 7Phase 1Models: BGM-GAN (Proposed) vs. standard GAN, CNN, DBN.AccuracyBGM-GAN consistently outperforms the other models across all training epochs, achieving a peak accuracy of 0.995 with 50 features at 210 epochs.
Variable: Performance across 5–50 features at 30, 90, 150, and 210 training epochs.
Figure 8Phase 1Models: BGM-GAN (Proposed) vs. standard GAN, CNN, DBN. Recall (TPR)BGM-GAN demonstrates a superior recall rate compared to existing techniques across varying feature counts and epochs.
Variable: Averaged performance across epochs.
Figure 9Phase 1Models: BGM-GAN (Proposed) vs. standard GAN, CNN, DBN.False Positive Rate (FPR)BGM-GAN achieves a lower false positive rate than comparison models, indicating higher precision.
Variable: Averaged performance across epochs.
Figure 11, Figure 12, Figure 13 and Figure 14Phase 2Models: IMIS (Proposed) vs. RCGU, EMRMR, MIFS, JMI.Accuracy, FPR, DR, F1-ScoreIMIS consistently outperforms other feature selection methods, achieving a peak accuracy of 0.979 and the best balance of precision and recall (F1-score).
Variable: Performance across 5–50 features.
Table 6Phase 2Models: IMIS (Proposed) Versus RCGU, EMRMR, MIFS, JMI.Computational EfficiencyIMIS is the most computationally efficient method, with the shortest execution time and lowest total runtime.
Figure 16, Figure 17, Figure 18, Figure 19, Figure 20 and Figure 21Phase 3Models: UA-DES-DBN (Proposed) vs. VGG16-PSO, DBN-IDS, DBN.Accuracy, FPR, DR, F1-Score, FNR, SpecificityUA-DES-DBN model achieves superior performance, with a peak accuracy of 0.986, a lower FPR, and a higher F1-score than comparison models.
Variable: Performance across 5–50 input features.
Table 9. Summary of research motivation, framework components, contributions, and limitations.
Table 9. Summary of research motivation, framework components, contributions, and limitations.
MotivationComponentContributionLimitation
Lack of data during pre-encryption phaseBGM-GANGenerates synthetic ransomware attack patterns to augment early-phase data.Effectiveness depends on the quality and diversity of initial real samples.
Static feature selection struggles to adapt to evolving threatsIMISDynamically selects and updates relevant features in real-time.May struggle with noisy or redundant features.
Risk of overfitting in deep detection modelsDBN + UA-DESLearns hierarchical patterns and employs uncertainty-aware stopping to optimize training.Requires tuning and high computational resources.
Absence of a unified, adaptive detection approachIntegrated 3-phase frameworkCombines augmentation, adaptive learning, and uncertainty-aware training for enhanced early detection.Currently evaluated on Windows PE files; may need generalization for other environments.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gazzan, M.; Alobaywi, B.; Almutairi, M.; Sheldon, F.T. A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware. Future Internet 2025, 17, 311. https://doi.org/10.3390/fi17070311

AMA Style

Gazzan M, Alobaywi B, Almutairi M, Sheldon FT. A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware. Future Internet. 2025; 17(7):311. https://doi.org/10.3390/fi17070311

Chicago/Turabian Style

Gazzan, Mazen, Bader Alobaywi, Mohammed Almutairi, and Frederick T. Sheldon. 2025. "A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware" Future Internet 17, no. 7: 311. https://doi.org/10.3390/fi17070311

APA Style

Gazzan, M., Alobaywi, B., Almutairi, M., & Sheldon, F. T. (2025). A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware. Future Internet, 17(7), 311. https://doi.org/10.3390/fi17070311

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop